Gone Phishing
Across
- 5. Crime conducted via the Internet or some other computer network.
- 6. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
- 8. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
- 13. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
- 14. Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
- 1. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
- 2. A secret word or phrase known only to you.
- 3. Whaling A type of fraud that targets high-profile end users.
- 4. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
- 7. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
- 9. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
- 10. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
- 11. What tells you that the website is secure in the browser.
- 12. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.