Cyber security and EthicsCross Word

12345678910
Across
  1. 2. Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
  2. 4. An area of data protection that concerns the proper handling of sensitive data
  3. 6. Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  4. 8. Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
  5. 10. Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
  1. 1. The use of a computer and telecommunication devices as an instrument to perform illegal activities
  2. 3. Extortion software that can lock your computer and then demand a ransom for its release.
  3. 5. Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
  4. 7. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  5. 9. Unsolicited messages sent in bulk by email