How Aware Are You?

12345678910
Across
  1. 2. Verifying the identity of a user, often using a username and password.
  2. 4. A fake website designed to steal personal information.
  3. 5. The practice of protecting systems and networks from digital attacks.
  4. 6. A program that replicates itself and spreads to other computers.
  5. 8. A software that monitors and blocks unauthorized access to a computer network.
  6. 10. A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
  1. 1. A string of characters used to log in to a system, it should be unique and complex.
  2. 3. Adding a second layer of verification beyond a password, often a code sent to your phone
  3. 7. The"lock" icon in a browser's address bar indicates a secure connection using this .
  4. 9. A type of malware that blocks access to your data until a sum of money is paid.