Across
- 2. Manages policies and practices aimed at preventing unauthorized access, data breaches, and misuse of personal data.
- 3. A string of unique characters used to login to a computer.
- 8. A sentence-like string of words used for authentication that is easy to remember but difficult to crack.
- 10. The practice of protecting systems, networks, and programs from digital attacks.
- 11. Attempting to acquire sensitive data, such as personal information or passwords, through a fraudulent solicitation in email.
- 12. A method to verify identity and protect computers from unauthorized use.
Down
- 1. Malware designed to deny a user or organization access to files on their computer.
- 4. Phishing method using text messages
- 5. A method used to defraud people over the phone.
- 6. To keep safe from harm.
- 7. A skilled programmer who secretly invades computers without authorization.
- 9. A type of artificial intelligence used to create convincing fake images, videos and audio recordings.