Across
- 2. The acronym for a method of logon that requires you to present two or more pieces of evidence to prove your identity.
- 5. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
- 6. A form of phishing that targets high profile individuals
- 10. A type of software designed to protect against malware and other threats
- 11. Malicious software that can cause damage to systems or data
- 13. A passwordless option for logging into devices
- 14. Malicious emails that request sensitive information or opening of attachments
- 15. Always _ _ _ _ your computer when you leave your desk.
Down
- 1. a string of random words that are a more secure version of passwords.
- 3. A form of malware in which files are locked until a payment is made to the attacker
- 4. _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
- 7. Method of converting plain text into a code that can only be read by authorised parties.
- 8. Errors or vulnerabilities in software
- 9. An update to software that fixes a vulnerability or bug.
- 12. _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
