Across
- 5. a technique where an attacker impersonates a trusted source to trick victims into revealing information
- 6. a type of phishing that uses voice scams to trick victims into disclosing information
- 10. malware that encrypts data and demands payment to restore access
- 12. Person who seeks ways to circumvent software protections
Down
- 1. cryptographic protocol that ensures secure communication over a computer network
- 2. a network of compromised devices remotely controlled by a cybercriminal
- 3. a form of cyberattack in which criminals insert themselves between entities in a communication channel to steal data
- 4. a social engineering attack used to steal sensitive information by impersonating trusted entities
- 7. a false message or claim spread to deceive or mislead users
- 8. security measure of the question-answer authentication type
- 9. a form of malware or hardware that keeps track of and records your keystrokes as you type
- 11. any software that displays advertisements while collecting revenue for its developer
