Across
- 5. A type of threat from within a company
- 7. Cybersecurity Awareness Month
- 9. The process of verifying identity
- 13. Ceo Of our Company
- 15. Our Internal Site
- 16. Ensuring data has not been altered
- 18. A security system that monitors network traffic
Down
- 1. Covertly observing someone's screen to steal information
- 2. The act of searching through trash for discarded personal information
- 3. Refers to a vulnerability that is exploited on the same day it becomes known
- 4. The middle child of Cloud Models
- 6. The "G" in GRC
- 8. A cloud computing platform from Microsoft
- 10. Gaining unauthorized access to a secure area by closely following someone
- 11. An amateur hacker
- 12. The process of converting data into a secure format
- 14. Icon for reporter button
- 17. A type of malware that pretends to be legitimate