Gone Phishing

1234567891011121314
Across
  1. 5. Crime conducted via the Internet or some other computer network.
  2. 6. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  3. 8. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  4. 13. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  5. 14. Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. 1. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  2. 2. A secret word or phrase known only to you.
  3. 3. Whaling A type of fraud that targets high-profile end users.
  4. 4. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  5. 7. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  6. 9. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  7. 10. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  8. 11. What tells you that the website is secure in the browser.
  9. 12. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.