My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Curricula Crosswords

Horizontales
Business Email _________________ also know as "BEC" attacks
A secret word or phrase used to get access to something
Social ______________ is the act of using human interaction and manipulation to obtain sensitive information
Requiring more than one authentication method to verify your identity
______________ response is an organized approach to dealing with the effects of a cyber security incident
USB drives, CDs, DVDs, and external hard drives are all common examples of _____________ media
_____________ security is to protect people, property, and information from damage or harm
Verticales
_______________ security is designed for the purpose of keeping your data secure
Malicious software designed to block access to a computer system until a sum of money is paid
The most FUN security awareness training company EVER
The world's cutest and most malicious 5 yr old hacker
An attempt to steal account information from an unsuspecting user using email