Cybersecurity

123456789101112
Across
  1. 1. _________ access is the act of gaining access to a computer system or physical location without proper permission.
  2. 5. it's a social engineering technique when an attacker lures a victim with a false promise that maipulates their greed or curiosity.
  3. 7. brute _____ attack is is a method of breaking encryption code by trying all possible encryption keys.
  4. 8. _______ password is a correct password.
  5. 10. the pieces of information you need to prove your identity and gain access to a specific system or service, typically a username and a password.
  6. 12. a type of malware that disguises itself as a legitimate program or file to fool users into downloading and running it.
Down
  1. 2. _________ data is any valuable or private information that requires protection, including financial, personal, or health-related details.
  2. 3. _________ phishing is a type of phishing attack that targets a specific person or group.
  3. 4. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  4. 6. social _______ is a manipulation technique that exploits human weaknesses to get private information, access or money.
  5. 9. it is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information.
  6. 11. a type of malware that can replicate itself and spread rapidly across a network, without requiring user interaction or attachment to a host program.