Across
- 3. Faking an email, phone number or website.
- 6. Attack that looks at/steals your data.
- 8. Software used to protect your device.
- 10. A string of random words used as a password.
Down
- 1. We are not allowed to plug this into departmental devices.
- 2. A program or programming code that self-replicates
- 4. Attack that locks your data and demands money.
- 5. Unsolicited emails that try to sell you products.
- 7. Process used to help identify phishing.
- 9. Malicious software.