Recap 1

12345678910111213
Across
  1. 2. captured from the user when they go to a pharming website
  2. 4. arrives in the user's inbox as a spoof e-mail
  3. 5. when a device is physical locked to a piece of furniture
  4. 7. acronym of a device which may help identify those who might have stolen data
  5. 9. a form of cyber attack where communication between two devices is intercepted (3,2,3,6)
  6. 11. spoof e-mails often have these errors
  7. 13. users have to use part of their body to identify themselves
Down
  1. 1. user is maliciously directed to a fake website
  2. 3. a form of physical access to an area (5,4)
  3. 6. biometrics that involve your eye(6,4)
  4. 8. biometrics that involve your hand
  5. 10. software that may contain viruses
  6. 12. biometrics that involve your walking movement