Across
- 3. Your _______ is like your underwear: don’t share it with your friends and change it often.
- 4. A person skilled in computer programming and system manipulation, often referring to both ethical and malicious individuals.
- 7. Malware that records keystrokes on a computer, capturing sensitive information like passwords and credit card details.
Down
- 1. Cybersecurity ________: A structured approach that defines guidelines and best practices for securing information systems.
- 2. _______ Force – password attack method where many passwords are submitted with the hopes of guessing the correct one.
- 3. Personally Identifiable Information
- 5. ______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
- 6. ________-factor Authentication: A security method that requires users to provide multiple forms of verification to access an account or system, enhancing security beyond passwords.