Across
- 3. Cyber criminals find and use these ______ for their malicious intents.
- 5. The magic number of characters for a strong password
- 7. _____ knowledge of recent threats as well as softwares
- 9. A Strong ______ ensure security by making it harder to access your accounts
- 11. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
- 12. Most users interact with their mobile devices more often than computers.
Down
- 1. Software that eliminates and mitigates malicious software
- 2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
- 4. Type of security when surfing the ____
- 6. Process of converting data into an unreadable form for data protection.
- 8. Do not include your ______ in your passwords such as your name or birthdate
- 10. Do not _____ your password with others