Across
- 3. phishing via sms/text messages
- 4. copy of data for recovery
- 6. browser add-ons that pose a supply chain risk
- 8. what should you do if you suspect a security incident?
- 14. malware that locks files for money
- 15. access rights granted to a user
- 16. phishing via voice/phone call
- 17. malicious software
Down
- 1. If a customer asks for security documents or compliance information, where should you direct them?
- 2. policy for how long data is kept
- 5. tool to store and generate credentials
- 7. virtual private network (acronym)
- 9. unauthorized physical entry
- 10. uncontrolled spread of data copies
- 11. records keystrokes to steal passwords
- 12. adherence to rules/regulations
- 13. social engineering via email
