Security Awareness Month - Week 1
Across
- 4. ____ authentication enables password-only logins to be replaced with secure, fast login experiences across websites and apps.
- 6. Our current password manager.
- 7. Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- 8. ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint).
Down
- 1. Flaws in a computer system that weaken the overall security of the device/system.
- 2. Phase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.
- 3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 5. ____ authentication requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction.