My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

CISO-CROSSWORD-110

Horizontales
Phishing done over phone calls using voice ( voice + phishing ) =……
……. are responsible for protecting their internet account and password.
Passwords should be……… from previously used passwords.
What is B in BYOD?
Just going behind an authorised person into a secured area .
Verticales
…….. is a process of finding weakness in computer or private networks to exploit its weakness & gain access.
The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to introduce targeted individuals to reveal confidential information is called …….
The activity of checking the URL name by placing mouse pointer on the link provided in the email is called ……..
Which attack will encrypt all your system files & will ask you to pay money in order to decrypt all the files and unlock the system .
…….. is a software/hardware used to control the incoming and outgoing network traffic by analysing the data packets & determining whether it should be allowed through or not .