Cyber Security Awareness Month Week 3
Across
- 2. Setup a ______ network with strong password for smart devices to limit the damage of a cyberattack on your home network.
- 5. ________is a network security device or software, that monitors and block specific traffic based on a defined set of security rules.
- 6. _______ engineering is a psychological manipulation technique that tricks users into giving away sensitive information
Down
- 1. Think before you click on _______ or links in any emails
- 3. ___ is an authentication method that requires the user to provide two or more verification factors to gain access.
- 4. Using a trusted ________ manager can help keep your passwords organized and secured.