abcd

12345678910
Across
  1. 7. malware that employs encryption to block victim’s access and hold personal information until a large amount of money is paid.
  2. 8. Combined protection of your physical and behavioral signatures with other authentications
  3. 9. This malware is used by hackers to mislead users by disguising as legitimate software causing malicious function.
  4. 10. A cyberattack on a server or user’s computer by redirecting the user from accessing the requested site to a fake, malicious site.
Down
  1. 1. Consumers are mostly targeted by hackers due to frequent online usage.
  2. 2. Gain illegal access to a computer system to cause damage, control or destroying the integrity of the data or stealing controlled information.
  3. 3. An attack that requires a carrier file to self-replicate
  4. 4. a scam in which an official looking email is sent to the victim that is duped into revealing confidential information that can be used for illicit purposes.
  5. 5. The weakest link in cybersecurity
  6. 6. an electronic authentication method that requires two or more proofs of identity to be able to access an account, application, or system.