Cybersecurity Crossword

12345678910111213141516171819202122
Across
  1. 3. a type of social engineering that uses messaging technologies (such as texts)
  2. 5. when you obtain a new device, you should always change the ________ password
  3. 6. social engineers evoke this emotion by making threats
  4. 8. infects your computer and does bad things
  5. 11. social engineers try to pique your _________
  6. 12. a type of social engineering using a voice channel
  7. 14. be careful what you share on ___________ media; it can be used against you
  8. 17. locks you out of your computer unless you pay a ransom
  9. 20. the third word in 'IoT'
  10. 21. a type of password that is long and hard to guess but memorable
  11. 22. you can ________ your data if you want to protect it from prying eyes
Down
  1. 1. one indicator of a phish is a sense of __________ from artificial deadlines
  2. 2. enable automatic software ___________ to install the latest security patches
  3. 4. you should always enable this type of authentication to secure your account
  4. 7. if you don't know the sender, never download one of these
  5. 9. a password's strength is determined by its __________
  6. 10. passwords should be ________ (only used for a single account are)
  7. 13. a password __________ will remember your passwords for you
  8. 15. think twice before you click on ___________ in e-mails
  9. 16. a network of infected devices used together to launch cyberattacks
  10. 18. this is what you should do if you receive a suspicious message
  11. 19. creating an extra copy of important files and documents