Across
- 3. Cybercriminals use social engineering to get users to share confidential information or download this.
- 5. A human firewall knows how to identify these by staying alert for warning signs and thinking before clicking or responding.
- 7. A "Level 2: Apprentice" password mixes uppercase and lowercase, and adds these.
- 9. The attacks used by cybercriminals often rely on deception and manipulation to scam people out of money or information.
- 12. The highest defense rating for passwords is "____"
- 13. A single compromised password can put your organization's security and personal information at ____.
- 14. This is a common way cyber villains get into computer networks.
Down
- 1. This password level uses simple passwords and the same password for every account.
- 2. The password defense rating for a "Level 1: Beginner" is "____".
- 4. An additional authentication method that uses a one-time code is recommended for a "Level 3: Legendary" password.
- 6. The name of the character that uses "convince" and "impersonate" attacks.
- 8. The human firewall manifesto recommends using this for every account.
- 10. Cybercriminals rely on being able to convince users to click on these.
- 11. The human firewall manifesto states that people, not this, are the backbone of any security infrastructure.
