Across
- 2. A voice-based scam technique
- 7. Use a ______ password to protect your accounts
- 8. Latest wireless security protocol for networks
- 10. Avoid using this kind of free network in public places
- 12. An internal framework that shapes the administration of an organisation
- 13. Leakage Unauthorised exposure of sensitive information
- 14. Risk Umbrella term for various threats for an organisation
- 16. Risk Risk due to obligations or failures in external agreements
- 19. Media Avoid these websites on official devices
Down
- 1. A calculated step to soften the blow of what might go wrong
- 3. Regulation that governs how personal information is stored.
- 4. Always lock your system when you leave it
- 5. If you find yourself in cyber threat, call me
- 6. System or process failing to work as intended
- 9. A type of cyberattack using fake emails
- 11. Intentional deception for personal or financial gain
- 13. Security Protect this sensitive information of clients
- 15. Known exposure despite controls
- 17. Register Structured risk documentation tool
- 18. Controls Tools used to prevent confidential info from leaving the system
