Across
- 2. Fraudulent attempts to steal sensitive information
- 4. A tool that uses large language models to create authentic-looking text, pictures, or video. Can be used to create deepfakes
- 9. What you should do with any suspicious communication!
- 10. Online harassment or bullying
- 11. Malware disguised as legitimate software
- 12. Multi-Factor Authentication
- 13. Virtual Private Network for secure connections
- 14. Using AI to create a likeness of someone in video, voice, or picture
- 17. Software update to fix security vulnerabilities
Down
- 1. Investment scam involving fake accounts
- 3. A phish sent by text
- 5. Software that collects data secretly
- 6. Self-replicating malware that spreads across networks
- 7. Investment currency usually preferred in pig butchering scams
- 8. Malware that encrypts files demanding ransom
- 9. Factor showing how likely an associate will report versus click a phishing email
- 15. Securing data by converting it into code
- 16. A group very concerned with cyberbullying