Cybersecurity Awareness

1234567891011121314151617
Across
  1. 4. A process by which a system verifies the identity of a user who wishes to access it.
  2. 8. Small piece of data stored on a user's computer by the web browser while browsing a website.
  3. 10. A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
  4. 11. Manipulating individuals into divulging confidential information through psychological tactics.
  5. 12. A type of malicious software that blocks access to a user's data until a sum of money is paid.
  6. 13. A secure bridge between your device and the internet, often used to keep browsing activity private.
  7. 14. AI-generated fake content, often video, that looks convincingly real.
  8. 16. A collection of software and tools to make phishing campaigns easier for attackers.
  9. 17. Software designed to harm or exploit any device, network, service, or program.
Down
  1. 1. Targeted phishing attempts directed at specific individuals or companies.
  2. 2. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  3. 3. Malicious code that's activated by a specific condition or event.
  4. 5. Information used to understand the enemy's strengths and weaknesses.
  5. 6. Phishing attacks that are executed via SMS.
  6. 7. Malicious software that records every keystroke to secretly gather personal information.
  7. 8. Ensuring operations and data adhere to established rules and regulations.
  8. 9. A network of private computers infected with malicious software and controlled as a group.
  9. 15. A secret combination, often alphanumeric, used for authentication.