Cybersecurity Awareness
Across
- 4. Settings that users can control to limit what an app can access on their device.
- 6. A technique used to steal sensitive information by tricking users through fake apps or emails.
- 9. A sum of money demanded by attackers in exchange for unlocking encrypted files.
- 11. The type of port that a Rubber Ducky uses to connect to a target machine.
- 13. malicious software that decrypt all user files after receiving money.
- 14. The best way to prevent Bluetooth attacks when not in use is to _______ your Bluetooth.
Down
- 1. Clicking ___ will lead you to download unwanted software to your device or visiting a phishing website
- 2. A software that protects your device from viruses.
- 3. A harmful software that can be delivered through a Rubber Ducky attack, download from unknown sources, and by clicking advertisements.
- 5. A ___ secretly monitors user activity.
- 7. Report to ___ if received a suspicious email from an unknown sender.
- 8. ___ is manipulating their victims in giving away sensitive information using phone calls.
- 10. A software that delivers advertising content randomly inside user device.
- 12. Keeping software and apps current to fix vulnerabilities that can be exploited