Across
- 3. Easier to remember and longer
- 5. Short and complex, harder to remember
- 7. Item or Message used in phishing
- 9. Phishing using QR Codes
- 11. Security method using physical traits
- 15. Hidden devices on ATM's or readers
- 16. Encrypted network connection
- 17. Authorization that requires two logins
- 18. Malware hiding in files that spread
- 19. Phishing high-profile individuals
Down
- 1. Record all things typed on keyboard
- 2. Infected ads on legit websites
- 4. Someone with unauthorized access
- 6. BitWarden is a password ______
- 8. Fooling a user to gain access
- 10. Self-replicating malware
- 12. Seemingly legit, but is fake
- 13. Malware that encrypts files
- 14. Phishing over the phone
- 15. Phising via text messages
