Across
- 5. A security system that requires more than one method of authentication to verify the user’s identity for a login or other transaction, also known as MFA or 2FA.
- 6. Attackers send fraudulent emails or messages that appear to be from reputable sources to trick individuals into revealing personal information, such as passwords or credit card numbers.
- 8. Similar to phishing, but conducted via SMS text messages. Attackers send messages that appear to be from legitimate sources to trick individuals into clicking on malicious links or providing personal information.
Down
- 1. Generally longer than passwords, often consisting of multiple words, which makes them harder to crack.
- 2. Fixes from software developers to correct vulnerabilities in their software. They are essential for keeping systems and data secure.
- 3. Attackers gain physical access to a secure area by following closely behind an authorized person. This often happens in office buildings where security measures like keycard access are in place.
- 4. are synthetic media in which a person in an existing image or video is replaced with someone else’s likeness using artificial intelligence (AI).
- 7. Attackers use phone calls to trick individuals into revealing personal information. They might pretend to be from a bank, tech support, or another trusted entity.
