Across
- 4. Unpatched or outdated applications that create security holes.
- 6. An attack that compromises a website known to be frequented by a specific target group.
- 9. False information spread intentionally to deceive.
- 10. The social engineering tactic of creating a fabricated scenario to obtain information.
- 11. A network connected using physical cables, like Ethernet.
- 14. A threat delivered via an attachment, like a malicious PDF or DOC file.
- 16. Phishing conducted via SMS text message.
- 17. A potential physical threat vector, like a USB drive.
- 19. False information that is spread, regardless of the intent to deceive.
- 20. Registering a domain name very similar to a popular one, relying on user mistypes.
- 21. End-of-life (EOL) software that no longer receives security patches. (2 Words)
- 23. A network that uses radio waves, like Wi-Fi.
- 24. A short-range wireless protocol used for PANs (Personal Area Networks).
Down
- 1. A type of spam that embeds its message in a picture to evade text filters.
- 2. Network ports left accessible and running services, creating potential entry points.
- 3. Security software installed directly on an endpoint, like a laptop or PC.
- 5. An attack that mimics the look and feel of a legitimate company's logo, website, or email.
- 7. Security scanning performed remotely, without installing software on the target device.
- 8. A social engineering attack using email to trick a user into revealing credentials.
- 12. Phishing conducted over a voice call.
- 13. Unsolicited and unwanted bulk email.
- 15. The technical name for text messaging (Abbr: SMS).
- 18. An attack that targets a trusted third-party vendor to compromise the final target.
- 22. The medium used for a 'vishing' attack.
