Cyber Awareness Passwords and MFAs

12345678910111213141516171819202122
Across
  1. 3. The process of verifying a user's identity.
  2. 9. These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
  3. 10. This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
  4. 11. This type of attack uses a predefined list of common words and phrases to guess passwords.
  5. 13. A flaw or weakness in a computer system that could be exploited to violate the system's security.
  6. 19. Changing this immediately is recommended on accounts you suspect may have been compromised.
  7. 21. Avoid using easily __________ information like names or birthdays in your passwords.
  8. 22. This type of attack tries out countless password combinations until the correct one is found.
Down
  1. 1. A strong password should be at least ______ characters long, according to NIST recommendations.
  2. 2. A method of authentication using unique patterns on an individual's fingertip.
  3. 4. An unauthorized user who attempts to gain access to an information system.
  4. 5. A common bad habit where users employ the same credentials across different websites and services.
  5. 6. The process of converting data into a format unreadable to anyone except those possessing a "key".
  6. 7. Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
  7. 8. A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
  8. 12. This type of authentication adds an extra layer of security beyond just a password.
  9. 14. Should be at least 16 characters long and combine random words to be strong.
  10. 15. A specific form of phishing that targets high-profile business executives.
  11. 16. A sequence of words or text used to control access to a computer; similar to a password.
  12. 17. and Clues (Word TAB Clue)
  13. 18. Passkeys often rely on this type of factor, like a fingerprint or facial scan.
  14. 20. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.