Security Issues in Informatics

12345678910
Across
  1. 2. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. 6. a type of malware that disguises itself as a legitimate program or file to gain access to a computer system
  3. 7. when personal information is accessed, disclosed, or lost without authorization
  4. 8. tricking someone into giving away sensitive information, like passwords or credit card details, by manipulating them psychologically, often by pretending to be someone they trust, like a company or a colleague, to gain access to systems or data
  5. 9. a malicious cyber attack that targets cloud-based systems, services, or data
Down
  1. 1. a security risk that occurs when someone with authorized access to an organization's resources misuses that access to cause harm
  2. 3. a secret word or phrase that must be used to gain admission to something. in this case,easily guessable or crackable by hackers, typically due to its short length, use of common words, personal information like names or birthdates, or predictable patterns
  3. 4. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  4. 5. a type of malicious software designed to block access to a computer system until a sum of money is paid
  5. 10. irrelevant or inappropriate messages sent on the internet to a large number of people