Cybersecurity Crossword

12345678910
Across
  1. 4. Any software or program intentionally designed to cause harm to a computer, system, or user.
  2. 7. A highly skilled computer professional who bypasses security measures to gain unauthorized access, often with malicious intent.
  3. 8. Using voice calls to trick victims.
  4. 9. Using text messages to trick victims.
  5. 10. Gaining unauthorized physical access.
Down
  1. 1. The criminal takes advantage of the relationship and tricks the victim into giving them money, extracting personal information, or installing malware.
  2. 2. An attempt to defraud a person or group after first gaining their trust.
  3. 3. Using enticing offers to lure victims into traps.
  4. 5. Creating a believable scenario to extract information.
  5. 6. Using fraudulent emails to steal information.