Across
- 6. Malicious software designed to gain access to your devices
- 7. The process of verifying the identity of a user or device before granting access to systems and data
- 9. A crucial cybersecurity practice involving making copies of data to prevent loss in case of a ransomware attack
- 10. In the context of supply chain attacks, this is a critical factor between partners that can be exploited by cybercriminals to infiltrate networks
- 11. A tactic used in AI-assisted attacks where attackers mimic a trusted entity to deceive victims, often through sophisticated methods
- 12. A cybersecurity threat that could be exploited to gain unauthorized access or cause harm by targeting less-secure elements in the supply network
Down
- 1. A type of security measure that uses unique physical characteristics for user identification
- 2. A fundamental principle in data privacy, requiring explicit permission before collecting, using, or sharing personal information
- 3. A common tactic used in social engineering where the attacker creates a sense of immediate action to bypass rational decision-making
- 4. A type of AI technology used in sophisticated cyberattacks, involving learning from data to improve over time
- 5. An incident where personal or confidential information is accessed or disclosed without authorization, requiring immediate response and remediation
- 8. A deceptive attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication