Chapter 2- TYPES OF ATTACKS
Across
- 3. Contain tracking information for an individual email
- 5. Fraud like Phishing, but it comes as a text message or SMS
- 9. It is a deceptive scheme or trick used to cheat someone out of something
- 10. It is merely an email trying to convince you to do something
- 12. It is a phone scam designed to get your personal information by impersonating
- 14. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- 16. Threat that involves sending email messages with a fake sender address
- 17. It is just like Phishing but it only targets specific individuals within an organization
Down
- 1. It is news or knowledge received or given
- 2. Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- 4. A link that direct you to a fake login page, in the hope that you might enter your credentials
- 6. Exclusively targets high-ranking individuals such as your BOSS within an organization
- 7. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- 8. It is a type of email attack where bad people are trying to steal your precious information
- 11. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- 13. Unsolicited bulk messages normally from people trying to sell something
- 15. An act of pretending to be another person for the purpose of commiting fraud