Across
- 1. When someone manipulates an email that tricks you into doing something against your better judgement
- 3. An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
- 7. Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
- 9. A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
- 2. A person who uses uses malicious tactics to gain unauthorised access to systems and data
- 3. Harmful computer programs used by hackers to steal information, gain access or lock your device
- 4. The address of a webpage (acronym)
- 5. Should be long, complex and not contain any personally identifiable information (like your dogs name)
- 6. Widely used technology that allows for the wireless connection between a device and a router
- 8. Never click on a ___ in an email unless you are sure that it's genuine
