Across
- 4. A process by which a system verifies the identity of a user who wishes to access it.
- 8. Small piece of data stored on a user's computer by the web browser while browsing a website.
- 10. A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
- 11. Manipulating individuals into divulging confidential information through psychological tactics.
- 12. A type of malicious software that blocks access to a user's data until a sum of money is paid.
- 13. A secure bridge between your device and the internet, often used to keep browsing activity private.
- 14. AI-generated fake content, often video, that looks convincingly real.
- 16. A collection of software and tools to make phishing campaigns easier for attackers.
- 17. Software designed to harm or exploit any device, network, service, or program.
Down
- 1. Targeted phishing attempts directed at specific individuals or companies.
- 2. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- 3. Malicious code that's activated by a specific condition or event.
- 5. Information used to understand the enemy's strengths and weaknesses.
- 6. Phishing attacks that are executed via SMS.
- 7. Malicious software that records every keystroke to secretly gather personal information.
- 8. Ensuring operations and data adhere to established rules and regulations.
- 9. A network of private computers infected with malicious software and controlled as a group.
- 15. A secret combination, often alphanumeric, used for authentication.