Across
- 3. Update: phishing attack where the hacker sends a message regarding the restart or deactivation of your membership.
- 6. a type of malware that gains access to your operating system, then locks you out of your own system, holding your own computer ransom until you pay for its release.
- 9. Activity: phishing attack where the hacker sends a message regarding your account being locked out or unusual sign ins.
- 11. Money Phish: phishing track where the hacker sends a message regarding some unearned money being given to you.
- 13. Phish: phishing attack where the hacker sends a message for you to log back into your account.
- 14. SMS phishing text messages asking you to click here.
- 18. Before You Click’: Money Vehicle’s 5 Cyber security questions to ask yourself as you receive messages today, no matter if it looks like a known source or not.
- 20. a system designed to block unauthorized access while still allowing outward communication.
- 21. Funny Mirror: the lens people see the world of social media through, never a clear picture but always warped into how the content creator wants you to see the
Down
- 1. a secret phrase used to gain admission into something.
- 2. voicemail messages demanding you to take action.
- 3. software that is designed to disrupt, damage, or gain unauthorized access to a computer.
- 4. creating a story based on bits of information that the attacker has gathered to earn trust and manipulate an individual to share personal information.
- 5. The Hackers: Money Vehicle’s approach to defending yourself in the online cyber war.
- 7. Drive: a data storage device that can be used even when the device is turned off.
- 8. Cloud: a data storage device that is stored on the internet
- 10. Software: a program designed to detect and remove viruses and other malware from your computer.
- 12. every aspect of your defense to fight the hackers.
- 14. Password: an unpredictable password made up of eight (8) or more characters and using a combination of uppercase letters, lowercase letters, symbols, and numbers
- 15. Engineering: the use of deception to manipulate an individual into giving personal information away.
- 16. Phish: phishing attack where the hacker sends a message regarding a package being delivered.
- 17. sending fraudulent messages that imitate a real company in hope of being given personal information.
- 19. Horse: Leaving a piece of infected hardware, like a USB drive, some place public and waiting for someone to pick it up and try to use it, providing access to your system.
