Across
2
Unique _ _ _ _ _ used for authentication
6
A deceptive email or message used for stealing sensitive information
7
Which type of authentication requires the use of multiple factors, such as a password and a text message, to verify a user's identity?
8
A method of authentication that should be changed periodically - typically an alpha- numeric combination.
Down
1
What is the process of converting plaintext into an unreadable format called?
2
Which cybersecurity practice involves regularly updating software and systems
3
Software that protects against viruses
4
Which type of malware is designed to block access to a computer system or data until a fee is paid?
5
Malicious software that can harm your computer
Cybersecurity Hygiene