Across
- 2. What system are we using to make logging in more secure than passwords?
- 3. What you should do if you are unsure of, or see a suspicious email.
- 5. An email attempting to get you to reveal information, often with an urgent tone.
- 7. _Phishing A type of phishing campaign that targets a specific person or group.
- 9. A type of malicious software designed to block access to a computer system until a sum of money is paid.
Down
- 1. The act of making an email look like it's coming from a legitimate or trusted source.
- 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access.
- 5. _-backing The act of following someone into a secured area after they've used their badge.
- 6. _Engineering The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- 8. What you should always do with your mouse before clicking a link.