Security Awareness

12345678910
Across
  1. 4. The process of verifying the identity of a user or a piece of information
  2. 6. A method for guessing a password that involves systematically trying a high volume of possible combinations of characters until the correct one is found
  3. 8. Which month is observed as Insider Threat month?
  4. 9. The use of AI to replace the likeness of one person with another in video or audio
  5. 10. Abbreviation of an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
Down
  1. 1. A weakness in the system is called --------------------
  2. 2. Malware that uses tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus, to trick users into visiting malware-containing websites
  3. 3. Targeted phishing attack aimed at senior executives masquerading as a legitimate email
  4. 5. The use of electronic means, primarily messaging and social media platforms, to bully and harass a victim
  5. 7. A kind of spyware software that records every keystroke made on a computer’s keyboard