Across
- 2. Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- 8. An area of data protection that concerns the proper handling of sensitive data
- 10. Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- 1. Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- 3. Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- 4. Unsolicited messages sent in bulk by email
- 5. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- 6. TheĀ use of a computer and telecommunication devices as an instrument to perform illegal activities
- 7. Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- 9. Extortion software that can lock your computer and then demand a ransom for its release.
