CS Month Week 3

1234567
Across
  1. 3. Your _______ is like your underwear: don’t share it with your friends and change it often.
  2. 4. A person skilled in computer programming and system manipulation, often referring to both ethical and malicious individuals.
  3. 7. Malware that records keystrokes on a computer, capturing sensitive information like passwords and credit card details.
Down
  1. 1. Cybersecurity ________: A structured approach that defines guidelines and best practices for securing information systems.
  2. 2. _______ Force – password attack method where many passwords are submitted with the hopes of guessing the correct one.
  3. 3. Personally Identifiable Information
  4. 5. ______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
  5. 6. ________-factor Authentication: A security method that requires users to provide multiple forms of verification to access an account or system, enhancing security beyond passwords.