Hack Con Cyber Security
Across
- 2. authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence
- 4. a network security device that monitors and filters incoming and outgoing network traffic
- 5. a way of scrambling data so that only authorized parties can understand the information
- 7. an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
- 8. wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
- 1. hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services
- 2. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- 3. malware that employs encryption to hold a victim's information for profit.
- 6. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers