Across
- 5. [?] is a situation where a victim is tempted into clicking a malicious link
- 6. Virus, Trojans and Worms are forms of [?]
- 8. [?] are attackers whose motivation are political or social causes
- 9. [?] is the term we used to to state that a transaction performed cannot be denied
- 10. The minimum length of password we aim for is [?} numeric representation
Down
- 1. [?} is a common social engineering tactic involving fake emails
- 2. Fingerprint and/or facial recognition are form of authentication known as [?] scans
- 3. The term [?] is commonly used in cybersecurity as a representation of weakness
- 4. Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
- 7. The microsoft brand for mobile device management is known as [?]