Cybersecurity Threats
Across
- 2. Games Some games might encourage to make in-app purchases
- 3. in the Middle Attacker intercepts or manipulates the communication between two parties without their knowledge or consent.
- 4. Websites avoid clicking on pop-up ads or links from unknown sources.
- 6. Unauthorized individuals trying to gain access to computer systems
Down
- 1. Disrupt the normal functioning of a targeted system
- 5. Engineering Tricks the users into providing an entry point for malware.