Security Awareness Month - Week 1

12345678
Across
  1. 4. ____ authentication enables password-only logins to be replaced with secure, fast login experiences across websites and apps.
  2. 6. Our current password manager.
  3. 7. Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. 8. ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint).
Down
  1. 1. Flaws in a computer system that weaken the overall security of the device/system.
  2. 2. Phase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.
  3. 3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  4. 5. ____ authentication requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction.