Across
- 1. the use of two different components to verify your identity
- 3. type of tolerance rkmiles has to any actions that create a hostile work environment
- 5. type of grammar that typically raise a red flag for phishing emails
- 8. the first line of defense against cyber criminals
- 10. what you should not let anyone do when you type in your password
- 14. a math function to make data only available with a key
- 16. malicious software that makes date or systems unusable until the victim makes a payment
- 18. where data can be accessed as a service
- 19. when you use the internet you leave this type of footprint behind
- 20. recently discovered vulnerabilities, not yet known to vendors or antivirus companies that hackers can exploit
Down
- 2. can be hardware or software
- 4. program that can automate task
- 6. mass emails sent to many people asking for sensitive information
- 7. virus disguised as legit software
- 9. type of consequence that a sender is asking from you to avoid
- 11. software to assist in detecting virus's
- 12. what you do with your mouse to see where a hyperlink will take you
- 13. email designed to look like it's from a person you know
- 15. what department should you get approval from for downloading software
- 17. what a password should be