Security Squares - Simple

1234567891011121314151617181920
Across
  1. 1. Deceptive Text Messages
  2. 4. Trained professional who specializes in IT infrastructure security
  3. 9. Role-Based Access Control
  4. 11. A digital form of payment
  5. 12. A device that provides two-factor for users to prove their identity
  6. 14. The art of protecting networks, devices and data from unauthorized access
  7. 15. The use of a fabricated story to gain someone's trust
  8. 17. National Institute of Standards and Technology
  9. 18. The process of giving a user permission to access resources
  10. 19. A Cybersecurity ----- is an attempt to gain unauthorized access to information
  11. 20. A Cybersecurity -------- is a violation of computer security policies
Down
  1. 2. Also know as MFA
  2. 3. Security that manages digital identities and user access to data and systems
  3. 5. Something you know, something you have, something you are
  4. 6. Sets of documents describing guidelines, standards and best practices
  5. 7. Something that helps an organization to do as much as possible to remain proactively prepared to move quickly to remediate any issues
  6. 8. Illegal activity carried out on a digital network
  7. 10. ----- coding, the process of designing code that adheres to best practices and safeguards
  8. 13. The application of policies, technologies and procedures to reduce the overall impact and risk
  9. 16. Voice Phishing