Cyber Month 2025 Crossword
Across
- 2. A fraudulent attempt to obtain sensitive information through deceptive emails.
- 3. A type of phishing attack in which cybercriminals use phone calls to trick individuals.
- 4. A string of multiple words, often longer than a typical password.
- 6. A deceptive tactic in which a malicious actor disguises their identity.
- 7. The process of converting information or data into a code in order to prevent unauthorized access.
- 8. Malicious software designed to gain unauthorized access to a computer or network.
- 9. A type of phishing attack that targets an organization’s top executives (i.e. “the big fish”).
Down
- 1. Phishing through text messages.
- 5. A type of malicious software designed to block a user’s access to computer files or systems until a sum of money is paid.
- 8. An extra layer of security for accounts requiring more than one form of verification.