Across
- 2. Cyber criminals may use hacked or ______________ accounts to impersonate your friend.
- 3. We should use 5 or ______________ words in our passwords.
- 5. One of 2FA is having ______________ password.
Down
- 1. Cyber criminals use malicious malware to ______________ your device.
- 4. One tell-tale sign that the message on social media is a scam when they use ______________ or threatening language.
