Across
- 3. a type of social engineering that uses messaging technologies (such as texts)
- 5. when you obtain a new device, you should always change the ________ password
- 6. social engineers evoke this emotion by making threats
- 8. infects your computer and does bad things
- 11. social engineers try to pique your _________
- 12. a type of social engineering using a voice channel
- 14. be careful what you share on ___________ media; it can be used against you
- 17. locks you out of your computer unless you pay a ransom
- 20. the third word in 'IoT'
- 21. a type of password that is long and hard to guess but memorable
- 22. you can ________ your data if you want to protect it from prying eyes
Down
- 1. one indicator of a phish is a sense of __________ from artificial deadlines
- 2. enable automatic software ___________ to install the latest security patches
- 4. you should always enable this type of authentication to secure your account
- 7. if you don't know the sender, never download one of these
- 9. a password's strength is determined by its __________
- 10. passwords should be ________ (only used for a single account are)
- 13. a password __________ will remember your passwords for you
- 15. think twice before you click on ___________ in e-mails
- 16. a network of infected devices used together to launch cyberattacks
- 18. this is what you should do if you receive a suspicious message
- 19. creating an extra copy of important files and documents
