Across
- 2. Regularly released enhancements to software or applications that fix vulnerabilities and provide new features.
- 5. A security attack in which the user is tricked into downloading malware, spyware, or other harmful software onto their mobile device via SMS text messages.
- 10. A secret combination of characters used to access an account or device.
- 11. An enhanced security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
- 12. A type of barcode that can be scanned to access information quickly, often used with smartphones.
Down
- 1. A method of phishing where the fraudster uses phone calls to lure victims into divulging personal information.
- 3. Technology that simulates human intelligence processes through automated algorithms.
- 4. Engineering Tactics that manipulate individuals into giving up confidential information, often by exploiting human psychological weaknesses.
- 6. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 8. Synthetic media in which a person in an existing image or video is replaced with someone else's likeness, often using advanced machine learning techniques.
- 9. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity in digital communication.