Cybersecurity 101

12345678
Across
  1. 5. A fraudulent attempts to obtain sensitive information through deceptive emails.
  2. 6. Phishing through text messages.
  3. 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. 8. A malicious software designed to gain unauthorized access to a computer or network.
Down
  1. 1. A type of phishing attack that targets a business’ top executives “the big fish”.
  2. 2. A cyberattack tactic where a malicious actor disguises their identity.
  3. 3. The process of converting information or data into a code, especially to prevent unauthorized access
  4. 4. Where attackers use phone calls to trick individuals.
  5. 5. A series of multiple words, often longer than a typical password.
  6. 8. An extra layer of security to accounts by requiring more than one form of verification.