Across
- 5. A fraudulent attempts to obtain sensitive information through deceptive emails.
- 6. Phishing through text messages.
- 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 8. A malicious software designed to gain unauthorized access to a computer or network.
Down
- 1. A type of phishing attack that targets a business’ top executives “the big fish”.
- 2. A cyberattack tactic where a malicious actor disguises their identity.
- 3. The process of converting information or data into a code, especially to prevent unauthorized access
- 4. Where attackers use phone calls to trick individuals.
- 5. A series of multiple words, often longer than a typical password.
- 8. An extra layer of security to accounts by requiring more than one form of verification.
