Across
- 3. SMS-based phishing attack via fraudulent messages.
- 5. Advanced Google search techniques for information.
- 9. Sturdy post blocking vehicles for security
- 14. A device that detects and measures physical properties.
- 15. The total exposure points to social engineering.
- 17. Exploiting misspelled URLs for malicious purposes.
- 18. Fraud exploiting email for financial theft
- 20. Manipulating users to disclose confidential information.
- 21. Pretending to be someone real or fictitious.
- 24. Replacing sensitive data with random tokenized values.
- 26. Gaining private information through fabricated scenarios.
- 27. Infecting frequented websites with malware
- 29. Removing sensitive data to ensure privacy.
- 30. Voice phishing using phone calls to scam victims.
- 31. Country-specific laws governing data usage.
Down
- 1. Restricting access to protect networks
- 2. Detects motion using microwave signal reflection
- 4. A creative invention or work with rights.
- 6. – Locating and identifying where data resides.
- 7. Determining device's physical location using coordinates
- 8. Creating a modified copy of original data.
- 10. Identification card granting secure area access
- 11. A targeted attack on specific individuals or groups.
- 12. False or misleading information with malicious intent.
- 13. Exploiting electronic payments for financial gain.
- 16. The highest level of data sensitivity
- 19. Converting data into unreadable form for security.
- 22. Illuminates areas to prevent unauthorized access
- 23. Confidential information providing business competitive advantage
- 25. Redirecting users to fake websites to steal data.
- 28. The highest classification level of sensitive data.
