AATT Cybersecurity

1234567891011121314
Across
  1. 1. Using more than one criteria for authentication
  2. 3. Internal communications network only accessibly by employees
  3. 4. Word used to gain access
  4. 8. The process of verifying the identity of a user, device, or system
  5. 10. A type of malware that demands payment in exchange for restoring access to data
  6. 12. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  7. 14. Type of attack that tricks users into revealing sensitive info
Down
  1. 2. Network device that filters incoming and outgoing network traffic based on defined rules
  2. 5. Using social interactions to gain information from a target
  3. 6. A type of software that is designed to damage or exploit a computer system
  4. 7. Type of attack where the attacker impersonates persons or companies in order to gain information
  5. 9. Type of malware that allows an attacker to remotely control a system or network
  6. 11. Malware removal software
  7. 13. Unwanted emails