Cyber Security Awareness Month Week 3

123456
Across
  1. 2. Setup a ______ network with strong password for smart devices to limit the damage of a cyberattack on your home network.
  2. 5. ________is a network security device or software, that monitors and block specific traffic based on a defined set of security rules.
  3. 6. _______ engineering is a psychological manipulation technique that tricks users into giving away sensitive information
Down
  1. 1. Think before you click on _______ or links in any emails
  2. 3. ___ is an authentication method that requires the user to provide two or more verification factors to gain access.
  3. 4. Using a trusted ________ manager can help keep your passwords organized and secured.