Cybersecurity Awareness
Across
- 2. Irrelevant or inappropriate messages sent over the internet.
- 4. Fraudulent scheme, often involving money or personal information.
- 6. A form of phishing using SMS or text messages.
- 8. Theft Stealing personal or sensitive information without permission.
- 9. Engineering Manipulative techniques to trick people into giving up confidential information.
Down
- 1. Two-factor authentication, an extra layer of security for online accounts.
- 3. Fraudulent attempt to obtain sensitive information through deceptive emails.
- 5. Malicious software designed to harm or exploit devices.
- 7. Unauthorized access to data in a system.