Across
- 2. Are passwords with no ‘L’ safe…
- 4. Body measurements and calculations related to human characteristics
- 5. a social engineering attack focussed on texts
- 6. This word is added to the subject line of an email to send a secure message.
- 8. A method of scrambling information, such as passwords, so they are not human-readable
- 9. Who bypasses all security measures in your house once a year
- 10. Using something in addition to your username and password
- 11. Modify a device to remove some sort of restrictions
Down
- 1. Web browsers use this to track your identity across websites.. Also Left out for Santa on Christmas eve
- 3. The first part of the CIA…
- 7. Malware that encrypts data, and payment must be made to decrypt
