Across
- 3. The process of verifying a user's identity.
- 9. These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
- 10. This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
- 11. This type of attack uses a predefined list of common words and phrases to guess passwords.
- 13. A flaw or weakness in a computer system that could be exploited to violate the system's security.
- 19. Changing this immediately is recommended on accounts you suspect may have been compromised.
- 21. Avoid using easily __________ information like names or birthdays in your passwords.
- 22. This type of attack tries out countless password combinations until the correct one is found.
Down
- 1. A strong password should be at least ______ characters long, according to NIST recommendations.
- 2. A method of authentication using unique patterns on an individual's fingertip.
- 4. An unauthorized user who attempts to gain access to an information system.
- 5. A common bad habit where users employ the same credentials across different websites and services.
- 6. The process of converting data into a format unreadable to anyone except those possessing a "key".
- 7. Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
- 8. A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
- 12. This type of authentication adds an extra layer of security beyond just a password.
- 14. Should be at least 16 characters long and combine random words to be strong.
- 15. A specific form of phishing that targets high-profile business executives.
- 16. A sequence of words or text used to control access to a computer; similar to a password.
- 17. and Clues (Word TAB Clue)
- 18. Passkeys often rely on this type of factor, like a fingerprint or facial scan.
- 20. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
