CyberSecurity Crossword

12345
Across
  1. 1. We have to ____ over a hyperlink that's displayed in the email message
  2. 5. Malware attack that capture all keyboard inputs
Down
  1. 2. Malware received from emails typically encrypts files and documents on the target machines
  2. 3. What do you call an email that looks legitimate but is actually a scam?
  3. 4. Attackers perform ____ to clone our faces, creating videos and pictures that mimic our identity