Across
- 4. malware designed to deny a user or organization access to files on their computer
- 6. _____ theft happens when someone impersonates people to commit fraud
- 7. is an attack that attempts to steal your money or your identity via voice call
- 8. provides the first line of defence against unauthorized access to your computer and personal information
Down
- 1. security exploit in which an infected USB charging station is used to compromise connected devices
- 2. social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
- 3. type of malicious software or malware that is installed on a computer without the end user's knowledge.
- 5. is an attack that attempts to steal your money or your identity via email