Across
- 3. Manipulating people into divulging personal or confidential information is known as ________ engineering
- 7. Digital story
- 8. In 2014, North Korean hackers demanded _______ Pictures withdraw The Interview
- 9. Black-and-white twistable treat
- 11. A tool that cloaks devices, for short
- 13. Scams designed to trick you into giving sensitive information
- 15. _______ of data
- 17. Short, rude
- 19. Hidden sites (two words)
- 21. Sweet Bobby is the longest ___________ case in the history of the internet
- 24. ______ phishing attacks are a more focused version
- 25. Malicious software, for short
- 26. A distinctive smell
- 28. Creator of the first computer virus in 1988
- 29. “Before” in old English
- 30. Business email compromise, for short
Down
- 1. Hackers attacking corporations or governments for political, competitive, or financial reasons is cyber _________
- 2. Two-_______ authentication
- 4. ______-day exploit, or none
- 5. Denial of _______ attack
- 6. Person, place, or thing
- 10. To encode information
- 12. Used to block cyberattacks
- 14. _______ Madison website data breach
- 16. Theft that involves stealing your personal information
- 18. Cybercriminal (hacker)
- 20. Malicious software that demands money
- 22. Criminals pretending to be a legitimate business
- 23. A strong one can prevent data breaches
- 27. Flightless bird
