October 2020 Newsletter Crossword Puzzle
Across
- 3. A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password.
- 6. A tool used to discover passwords.
- 9. A type of password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts is called a (blank) stuffing.
- 10. The practice of (blank) engineering is when social tactics are used to gain information from people or get people to do things they would not normally do.
Down
- 1. Hardware that has wireless sensors which transmit data from one place to another over the internet.
- 2. A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
- 4. A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
- 5. The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other.
- 7. Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
- 8. U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.