Cybersecurity Awareness

123456789
Across
  1. 2. Fraudulent scheme, often involving money or personal information.
  2. 5. Stealing personal or sensitive information without permission.
  3. 8. Fraudulent attempt to obtain sensitive information through deceptive emails.
  4. 9. Malicious software designed to harm or exploit devices.
Down
  1. 1. A form of phishing using SMS or text messages.
  2. 3. Two-factor authentication, an extra layer of security for online accounts.
  3. 4. Unauthorized access to data in a system.
  4. 6. Manipulative techniques to trick people into giving up confidential information.
  5. 7. Irrelevant or inappropriate messages sent over the internet.