Across
- 3. A social engineering attack in which the fraudster builds a false sense of trust with the victim
- 5. The environment in which communication over computer networks occurs through a widespread interconnected digital technology
- 6. Defrauding people over the phone, enticing them to divulge sensitive information
- 9. A type of threat where an unauthorized entity gains access to a system by illegitimately posing as an authorized entity
- 11. The process of converting information or data into a unreadable code, especially to prevent unauthorized access
Down
- 1. An attack method used by fraudsters that focus on people rather than technology
- 2. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
- 4. A software that blocks access to the victim's computer/data and threatens to publish or delete it until ransom is paid
- 7. A secret word or phrase that is used to access a computer system or service
- 8. A cyberattack technique that injects malicious code within user's digital advertisements
- 10. A program made up of malicious code that replicates and propagates itself from device to device using computer networks
- 12. an authorized simulated attack performed on a computer system to evaluate its security
