Recap 1
Across
- 2. captured from the user when they go to a pharming website
- 4. arrives in the user's inbox as a spoof e-mail
- 5. when a device is physical locked to a piece of furniture
- 7. acronym of a device which may help identify those who might have stolen data
- 9. a form of cyber attack where communication between two devices is intercepted (3,2,3,6)
- 11. spoof e-mails often have these errors
- 13. users have to use part of their body to identify themselves
Down
- 1. user is maliciously directed to a fake website
- 3. a form of physical access to an area (5,4)
- 6. biometrics that involve your eye(6,4)
- 8. biometrics that involve your hand
- 10. software that may contain viruses
- 12. biometrics that involve your walking movement