Chapter 2- TYPES OF ATTACKS

1234567891011121314151617
Across
  1. 3. It is a phone scam designed to get your personal information by impersonating
  2. 7. A link that direct you to a fake login page, in the hope that you might enter your credentials
  3. 8. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
  4. 11. It is a type of email attack where bad people are trying to steal your precious information
  5. 13. Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
  6. 14. Fraud like Phishing, but it comes as a text message or SMS
  7. 16. It is just like Phishing but it only targets specific individuals within an organization
  8. 17. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
Down
  1. 1. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
  2. 2. Threat that involves sending email messages with a fake sender address
  3. 4. It is news or knowledge received or given
  4. 5. Unsolicited bulk messages normally from people trying to sell something
  5. 6. It is merely an email trying to convince you to do something
  6. 9. Contain tracking information for an individual email
  7. 10. Exclusively targets high-ranking individuals such as your BOSS within an organization
  8. 12. It is a deceptive scheme or trick used to cheat someone out of something
  9. 15. An act of pretending to be another person for the purpose of commiting fraud