Across
- 6. A tool used to discover passwords.
- 8. A password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts.
- 10. Concept of connecting a device with an on and off switch to the internet and/or to each other.
Down
- 1. A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
- 2. A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password?
- 3. Practice of using social tactics to gain information from people or get people to do things they would not normally do.
- 4. Hardware that has wireless sensors which transmit data from one place to another over the internet.
- 5. U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.
- 7. A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
- 9. Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
