Across
- 3. Converting plain data into a secret code, which later decoded by a user with a 'key'.
- 5. VPN stands for _________ Private Network, Pulse Secure is an example of this.
- 6. Dangerous code hidden in online ads to tricker users into visiting unsafe sites or downloading malware.
- 7. Using text messages to attempt to gain access to sensitive information
- 8. Something that occurs before any new program is used at NLH is a risk _______.
- 11. Criminals pose as bank staff or other employees on the phone to try to trick you into sharing information.
Down
- 1. The name of the email manager NLH uses to reduce the amount of Spam delivered to your inbox.
- 2. Using the human tendency to trust to manipulate people to gain sensitive information.
- 4. Another word for unsolicited emails, NLH has a dedicated email address for monitoring this.
- 9. Using software to appear to be someone else, either by email address or caller ID.
- 10. Harmful software meant to disable, infect, or allow hackers remote control of a device.