Gone Phishing

12345678910111213
Across
  1. 2. What tells you that the website is secure in the browser.
  2. 5. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  3. 6. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  4. 10. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  5. 11. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  6. 12. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  7. 13. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
Down
  1. 1. Conversion of data into a form that cannot be easily understood by unauthorized people.
  2. 2. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  3. 3. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  4. 4. A secret word or phrase known only to you.
  5. 7. A type of fraud that targets high-profile end users.
  6. 8. Crime conducted via the Internet or some other computer network.
  7. 9. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.