Show How Much You Know About Social Engineering

1234567891011121314
Across
  1. 3. Cybercriminals use social engineering to get users to share confidential information or download this.
  2. 5. A human firewall knows how to identify these by staying alert for warning signs and thinking before clicking or responding.
  3. 7. A "Level 2: Apprentice" password mixes uppercase and lowercase, and adds these.
  4. 9. The attacks used by cybercriminals often rely on deception and manipulation to scam people out of money or information.
  5. 12. The highest defense rating for passwords is "____"
  6. 13. A single compromised password can put your organization's security and personal information at ____.
  7. 14. This is a common way cyber villains get into computer networks.
Down
  1. 1. This password level uses simple passwords and the same password for every account.
  2. 2. The password defense rating for a "Level 1: Beginner" is "____".
  3. 4. An additional authentication method that uses a one-time code is recommended for a "Level 3: Legendary" password.
  4. 6. The name of the character that uses "convince" and "impersonate" attacks.
  5. 8. The human firewall manifesto recommends using this for every account.
  6. 10. Cybercriminals rely on being able to convince users to click on these.
  7. 11. The human firewall manifesto states that people, not this, are the backbone of any security infrastructure.