Find the Cybersecurity Terms

123456789
Across
  1. 4. Legitimate promotional email that you’ve technically solicited, though it may serve little to no purpose to you.
  2. 5. Cybercriminals stealing login credentials to access an email account, which can later be used to commit fraud, send phishing emails, steal data, and beyond.
  3. 7. An isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
  4. 8. Acronym. Currently the most expensive type of cybercrime, evading traditional email security systems
  5. 9. A data transmission error when pieces of data don’t make it to their intended destination.
Down
  1. 1. A type of phishing attack aimed at high-level executives at an organization
  2. 2. A trial-and-error method of finding correct login credentials.
  3. 3. Type of attack; a threat vector that targets a specific group of users by compromising a website they frequently visit.
  4. 6. Acronym. A cloud security checkpoint between users and cloud providers.
  5. 7. A method to send emails with a forged sender address, often used to deliver spam and phishing attacks