Chapter 2- TYPES OF ATTACKS

1234567891011121314151617
Across
  1. 3. Contain tracking information for an individual email
  2. 5. Fraud like Phishing, but it comes as a text message or SMS
  3. 9. It is a deceptive scheme or trick used to cheat someone out of something
  4. 10. It is merely an email trying to convince you to do something
  5. 12. It is a phone scam designed to get your personal information by impersonating
  6. 14. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
  7. 16. Threat that involves sending email messages with a fake sender address
  8. 17. It is just like Phishing but it only targets specific individuals within an organization
Down
  1. 1. is news or knowledge received or given
  2. 2. Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
  3. 4. A link that direct you to a fake login page, in the hope that you might enter your credentials
  4. 6. Exclusively targets high-ranking individuals such as your BOSS within an organization
  5. 7. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
  6. 8. It is a type of email attack where bad people are trying to steal your precious information
  7. 11. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
  8. 13. unsolicited bulk messages normally from people trying to sell something
  9. 15. An act of pretending to be another person for the purpose of commiting fraud