Across
- 1. Deceptive Text Messages
- 4. Trained professional who specializes in IT infrastructure security
- 9. Role-Based Access Control
- 11. A digital form of payment
- 12. A device that provides two-factor for users to prove their identity
- 14. The art of protecting networks, devices and data from unauthorized access
- 15. The use of a fabricated story to gain someone's trust
- 17. National Institute of Standards and Technology
- 18. The process of giving a user permission to access resources
- 19. A Cybersecurity ----- is an attempt to gain unauthorized access to information
- 20. A Cybersecurity -------- is a violation of computer security policies
Down
- 2. Also know as MFA
- 3. Security that manages digital identities and user access to data and systems
- 5. Something you know, something you have, something you are
- 6. Sets of documents describing guidelines, standards and best practices
- 7. Something that helps an organization to do as much as possible to remain proactively prepared to move quickly to remediate any issues
- 8. Illegal activity carried out on a digital network
- 10. ----- coding, the process of designing code that adheres to best practices and safeguards
- 13. The application of policies, technologies and procedures to reduce the overall impact and risk
- 16. Voice Phishing