Hack Con Cyber Security

12345678
Across
  1. 2. authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence
  2. 4. a network security device that monitors and filters incoming and outgoing network traffic
  3. 5. a way of scrambling data so that only authorized parties can understand the information
  4. 7. an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
  5. 8. wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
  1. 1. hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services
  2. 2. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  3. 3. malware that employs encryption to hold a victim's information for profit.
  4. 6. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers