Cybersecurity Awareness
Across
- 2. Fraudulent scheme, often involving money or personal information.
- 5. Stealing personal or sensitive information without permission.
- 8. Fraudulent attempt to obtain sensitive information through deceptive emails.
- 9. Malicious software designed to harm or exploit devices.
Down
- 1. A form of phishing using SMS or text messages.
- 3. Two-factor authentication, an extra layer of security for online accounts.
- 4. Unauthorized access to data in a system.
- 6. Manipulative techniques to trick people into giving up confidential information.
- 7. Irrelevant or inappropriate messages sent over the internet.