Brand Abuse Crossword

123456789101112
Across
  1. 3. One of you receives a seemingly authentic email from a supposed colleague in the Compliance department, though you do not know that person, asking you to review a legal situation and provide feedback. The related document is attached. What is this type of phishing attack called, which targets a specific person or group within a company?
  2. 5. What term refers to the area of laws and regulations that protect creations of the mind, such as inventions, literary and artistic works, and symbols, names, and images used in commerce, and is also an abbreviation commonly used for internet addresses?
  3. 6. What term is used for the part of the internet that is intentionally hidden and accessible only through special software and is often used for illegal activities.
  4. 8. What has been stolen from people whose personal data has been used by someone else to impersonate them, often for financial gain?
  5. 11. What term describes the unauthorised replication of well-known brand products or logos, often used by criminals to deceive consumers and disguise their fraudulent activities?
  6. 12. What unique online identifier needs to be monitored to protect a brand's integrity (like Autohero) in the digital world and appears after 'www' in a URL?
Down
  1. 1. The Digital Millennium ______ Act (DMCA) is a US law that provides for a notice-and-takedown procedure. This law focuses on digital media and helps content owners to remove stolen content quickly and efficiently. It applies to organisations such as internet service providers (ISPs), web hosting providers and search engines. What right is the law intended to protect that is omitted in the abbreviation?
  2. 2. Spoofing is a fraudulent method by which attackers manipulate email headers to impersonate a trusted contact and make both the email address and the content appear legitimate. What is the term for the type of crime that is committed using information and communication technology or against it?
  3. 4. What do you call someone who tries to imitate or copy a business idea without any permission? The term is also used to refer to the first ever cloned cat.
  4. 7. What is the term for a legally protected sign used to distinguish the goods or services of one company from those of others, which also serves as the basis for taking action against the unauthorised registration and use of a domain name, also known as cybersquatting?
  5. 9. How is the global communications network for messaging and payments called that is used for the secure exchange of financial messages between financial institutions, such as banks, worldwide to ensure protection against cyber attacks, prevent financial fraud and enable secure payments across national borders?
  6. 10. Who acts as the digital “landlord”, providing the space and necessary resources to keep any website visible and accessible on the internet?