Across
- 1. Using more than one criteria for authentication
- 3. Internal communications network only accessibly by employees
- 4. Word used to gain access
- 8. The process of verifying the identity of a user, device, or system
- 10. A type of malware that demands payment in exchange for restoring access to data
- 12. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- 14. Type of attack that tricks users into revealing sensitive info
Down
- 2. Network device that filters incoming and outgoing network traffic based on defined rules
- 5. Using social interactions to gain information from a target
- 6. A type of software that is designed to damage or exploit a computer system
- 7. Type of attack where the attacker impersonates persons or companies in order to gain information
- 9. Type of malware that allows an attacker to remotely control a system or network
- 11. Malware removal software
- 13. Unwanted emails