My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cyber Security Awareness Month

Crossword Challenge
Horizontales
Phishing email clue
Internet of Things
This is one of the clues used to determine if an email is legitimate or not.
The set of points on the boundary of a system, a system element, or an environment where an attacker can try to enter, cause an effect on, or extract data from, that system, system element, or environment.
This attack is delivered via your phone
Should be long and complex, and like your socks, changed often
One of the most frequent attack vectors used by cyber criminals
Something you might see in an email
Verticales
This type of attack encrypts your files and holds them hostage
A tone often found in phishing emails
This type of attack is personalized
The ability to determine for yourself to what extent you want to share your personal information and with whom.
A type of attack which targets a CEO or CFO of an organization
This type of attack is received through text messages
This adds a layer of security to the sign-in process