Across
- 3. It is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
- 5. It is the term used for various pop-up advertisements that show up on your computer or mobile device.
Down
- 1. It is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- 2. It is a type of malware that holds a victim's sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.
- 4. It is cybersecurity software that detects and removes malicious software (malware) from a computer, device, or network.