Across
- 1. _________ access is the act of gaining access to a computer system or physical location without proper permission.
- 5. it's a social engineering technique when an attacker lures a victim with a false promise that maipulates their greed or curiosity.
- 7. brute _____ attack is is a method of breaking encryption code by trying all possible encryption keys.
- 8. _______ password is a correct password.
- 10. the pieces of information you need to prove your identity and gain access to a specific system or service, typically a username and a password.
- 12. a type of malware that disguises itself as a legitimate program or file to fool users into downloading and running it.
Down
- 2. _________ data is any valuable or private information that requires protection, including financial, personal, or health-related details.
- 3. _________ phishing is a type of phishing attack that targets a specific person or group.
- 4. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- 6. social _______ is a manipulation technique that exploits human weaknesses to get private information, access or money.
- 9. it is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information.
- 11. a type of malware that can replicate itself and spread rapidly across a network, without requiring user interaction or attachment to a host program.
