Across
- 3. The state of being exposed to a possible attack due to a weakness in the hardware, software, configuration or the user’s operating system.
- 4. A work arrangement that allows an employee to work at an approved alternate worksite such as home.
- 5. An attack against Bluetooth devices to send unsolicited messages to Bluetooth devices.
- 6. Malware that infects your PC or mobile device and gathers information about you.
- 8. Attackers gain unauthorized access to Bluetooth devices in order to access data on the device.
- 9. An attacker launches attacks to further a cause or as part of an activist movement.
- 10. Targets high-level executives to gain confidential company or agency information that the cybercriminal may not get anywhere else.
Down
- 1. Occurs as a result of a cyberattack that allows cybercriminals to gain unauthorized access to a computer system or network and steal the privacy personal and financial data of the customers or users.
- 2. Practice of using social tactics to gain information.
- 7. An attack that tricks users into clicking something other than what they think they’re clicking.
