Page 95 - Cyber Safety C-8
P. 95

21 st
                                                                                            Century   #Critical Thinking
                                                                                             Skills


                 Solve the crossword!
                 ACROSS
                 3.  It uses malicious software to record every keystroke entered on a computer.

                 4.  It is a method where an attacker tries every possible combination of characters until the correct
                    password is found.

                 5.  This involves using a part of the body to verify identity.
                 DOWN
                 1.  A carefully designed secret code that provides powerful protection against cyber threats.

                 2.  This attack uses a pre-made list (dictionary) of Common words, frequently used passwords,
                    popular names, number patterns, etc.

                                                                   1
                                                                   S
                                                                                    2
                                                                                     D






                              3
                               K                                       G



















                                   4
                                   B
                                                                   D



                                                5
                                                 B
                                                                                    K










                                                                                      Advanced Password Protection  93
   90   91   92   93   94   95   96   97   98   99   100