Across
- 4. malware designed to deny a user or organization access to files on their computer
- 6. security exploit in which an infected USB charging station is used to compromise connected devices
- 7. social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
Down
- 1. provides the first line of defence against unauthorized access to your computer and personal information
- 2. is an attack that attempts to steal your money or your identity via email
- 3. is an attack that attempts to steal your money or your identity via voice call
- 5. _____ theft happens when someone impersonates people to commit fraud