Across
- 2. The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
- 6. Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
- 8. An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
- 10. Process of determining whether someone or something is who or what they say they are.
- 11. A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- 14. A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
- 1. Characters used to verify identity, usually to gain access to an account, website, or system. For more information
- 3. Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
- 4. Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
- 5. The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- 7. An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
- 9. An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
- 12. Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
- 13. A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.
