Security Squares - Advanced

1234567891011121314151617181920
Across
  1. 4. Software designed to monitor and record network traffic
  2. 7. Specific training aimed at heightening knowledge within an organization
  3. 8. Fake jobs, fake lottery, fake money scams are all examples
  4. 10. Sizzle, Pork and MMM... or Junk E-mail
  5. 11. The fraudulent practice of sending emails ostensibly to induce others to reveal confidential information
  6. 13. What Spiderman spins during the night
  7. 15. When an attacker sends an email to the CEO pretending to be a client
  8. 16. A crime in which someone uses PII data to impersonate someone else
  9. 17. One spider, one ant, or one cricket
  10. 18. When you entice the fish with a worm
  11. 19. A malicious application or script that can be used to take advantage of a computer's vulnerability
  12. 20. Phishing with text
Down
  1. 1. A "goodguy" cap
  2. 2. The process of creating, communicating and maintaining policies and procedures within an organization
  3. 3. Images and videos that appear real but are not
  4. 5. When an authorized internal user poses a danger to an organization because they have authorized access to inside information
  5. 6. A fix for a specific issue that is an emergency
  6. 9. A blue monster who is obsessed with eating as many as possible of these
  7. 12. An extreme coughing fit
  8. 14. Often causes road rage