Cyber Awareness Week

123456789
Across
  1. 1. When someone manipulates an email that tricks you into doing something against your better judgement
  2. 3. An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
  3. 7. Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
  4. 9. A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
  1. 2. A person who uses uses malicious tactics to gain unauthorised access to systems and data
  2. 3. Harmful computer programs used by hackers to steal information, gain access or lock your device
  3. 4. The address of a webpage (acronym)
  4. 5. Should be long, complex and not contain any personally identifiable information (like your dogs name)
  5. 6. Widely used technology that allows for the wireless connection between a device and a router
  6. 8. Never click on a ___ in an email unless you are sure that it's genuine