Cybersecurity

123456789101112
Across
  1. 3. Cyber criminals find and use these ______ for their malicious intents.
  2. 5. The magic number of characters for a strong password
  3. 7. _____ knowledge of recent threats as well as softwares
  4. 9. A Strong ______ ensure security by making it harder to access your accounts
  5. 11. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
  6. 12. Most users interact with their mobile devices more often than computers.
Down
  1. 1. Software that eliminates and mitigates malicious software
  2. 2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
  3. 4. Type of security when surfing the ____
  4. 6. Process of converting data into an unreadable form for data protection.
  5. 8. Do not include your ______ in your passwords such as your name or birthdate
  6. 10. Do not _____ your password with others