October 2020 Newsletter Crossword Puzzle

12345678910
Across
  1. 3. A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password.
  2. 6. A tool used to discover passwords.
  3. 9. A type of password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts is called a (blank) stuffing.
  4. 10. The practice of (blank) engineering is when social tactics are used to gain information from people or get people to do things they would not normally do.
Down
  1. 1. Hardware that has wireless sensors which transmit data from one place to another over the internet.
  2. 2. A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
  3. 4. A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
  4. 5. The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other.
  5. 7. Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
  6. 8. U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.