Puzzle No. 2

1234567891011121314
Across
  1. 3. A string of characters used to verify the identity of a user during the authentication process.
  2. 5. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
  3. 8. Ensuring that authorized users have access to information and associated assets when required.
  4. 10. Sentence-like format of password which is strong but easier to remember.
  5. 13. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
  6. 14. You should not write down your password in this type of physical medium.
Down
  1. 1. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
  2. 2. Ensuring that information is accessible only to those authorized to have access.
  3. 4. Safeguarding the accuracy and completeness of information.
  4. 5. Complete the sentence: ________ is everyone’s responsibility.
  5. 6. A weakness in your security policy, implementation, design, and controls.
  6. 7. These fix general software problems and provide new security patches where criminals might get in.
  7. 9. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
  8. 11. An event that will cause harm to you or your asset.
  9. 12. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.