CISO Crossword Puzzle: 0423

123456789101112
Across
  1. 3. A social engineering attack in which the fraudster builds a false sense of trust with the victim
  2. 5. The environment in which communication over computer networks occurs through a widespread interconnected digital technology
  3. 6. Defrauding people over the phone, enticing them to divulge sensitive information
  4. 9. A type of threat where an unauthorized entity gains access to a system by illegitimately posing as an authorized entity
  5. 11. The process of converting information or data into a unreadable code, especially to prevent unauthorized access
Down
  1. 1. An attack method used by fraudsters that focus on people rather than technology
  2. 2. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
  3. 4. A software that blocks access to the victim's computer/data and threatens to publish or delete it until ransom is paid
  4. 7. A secret word or phrase that is used to access a computer system or service
  5. 8. A cyberattack technique that injects malicious code within user's digital advertisements
  6. 10. A program made up of malicious code that replicates and propagates itself from device to device using computer networks
  7. 12. an authorized simulated attack performed on a computer system to evaluate its security