Across
- 2. A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
- 6. The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- 10. Something that shows up in an email.
- 13. Threats Malware is defined as any device.
- 15. An attempt by hackers to damage or destroy a computer network or system.
- 16. A security tool, which may be a hardware or software solution that is used to filter network traffic.
- 19. Identity and Privacy Protection.
- 21. Someone attempting to create Identity fraud.
- 22. The act of falsifying the identity of the source of a communication or interaction.
Down
- 1. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- 3. Shield The ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
- 4. A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
- 5. a dishonest scheme; a fraud.
- 7. A form of malware that monitors user activities and reports them to an external their party.
- 8. The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
- 9. Hard to detect both by Users.
- 11. The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
- 12. An attack focusing on people rather than technology.
- 14. A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
- 17. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
- 18. Alerts used as a warning of danger.
- 20. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.