abcd
Across
- 7. malware that employs encryption to block victim’s access and hold personal information until a large amount of money is paid.
- 8. Combined protection of your physical and behavioral signatures with other authentications
- 9. This malware is used by hackers to mislead users by disguising as legitimate software causing malicious function.
- 10. A cyberattack on a server or user’s computer by redirecting the user from accessing the requested site to a fake, malicious site.
Down
- 1. Consumers are mostly targeted by hackers due to frequent online usage.
- 2. Gain illegal access to a computer system to cause damage, control or destroying the integrity of the data or stealing controlled information.
- 3. An attack that requires a carrier file to self-replicate
- 4. a scam in which an official looking email is sent to the victim that is duped into revealing confidential information that can be used for illicit purposes.
- 5. The weakest link in cybersecurity
- 6. an electronic authentication method that requires two or more proofs of identity to be able to access an account, application, or system.