Page 95 - Cyber Safety C-8
P. 95
21 st
Century #Critical Thinking
Skills
Solve the crossword!
ACROSS
3. It uses malicious software to record every keystroke entered on a computer.
4. It is a method where an attacker tries every possible combination of characters until the correct
password is found.
5. This involves using a part of the body to verify identity.
DOWN
1. A carefully designed secret code that provides powerful protection against cyber threats.
2. This attack uses a pre-made list (dictionary) of Common words, frequently used passwords,
popular names, number patterns, etc.
1
S
2
D
3
K G
4
B
D
5
B
K
Advanced Password Protection 93

