Week 2 Challenge - Cyber Security Awareness Month

123456789101112131415
Across
  1. 2. The acronym for a method of logon that requires you to present two or more pieces of evidence to prove your identity.
  2. 5. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
  3. 6. A form of phishing that targets high profile individuals
  4. 10. A type of software designed to protect against malware and other threats
  5. 11. Malicious software that can cause damage to systems or data
  6. 13. A passwordless option for logging into devices
  7. 14. Malicious emails that request sensitive information or opening of attachments
  8. 15. Always _ _ _ _ your computer when you leave your desk.
Down
  1. 1. a string of random words that are a more secure version of passwords.
  2. 3. A form of malware in which files are locked until a payment is made to the attacker
  3. 4. _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
  4. 7. Method of converting plain text into a code that can only be read by authorised parties.
  5. 8. Errors or vulnerabilities in software
  6. 9. An update to software that fixes a vulnerability or bug.
  7. 12. _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.