Cybersecurity Awareness Crossword

12345678
Across
  1. 4. malware designed to deny a user or organization access to files on their computer
  2. 6. _____ theft happens when someone impersonates people to commit fraud
  3. 7. is an attack that attempts to steal your money or your identity via voice call
  4. 8. provides the first line of defence against unauthorized access to your computer and personal information
Down
  1. 1. security exploit in which an infected USB charging station is used to compromise connected devices
  2. 2. social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
  3. 3. type of malicious software or malware that is installed on a computer without the end user's knowledge.
  4. 5. is an attack that attempts to steal your money or your identity via email