Across
- 4. Legitimate promotional email that you’ve technically solicited, though it may serve little to no purpose to you.
- 5. Cybercriminals stealing login credentials to access an email account, which can later be used to commit fraud, send phishing emails, steal data, and beyond.
- 7. An isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- 8. Acronym. Currently the most expensive type of cybercrime, evading traditional email security systems
- 9. A data transmission error when pieces of data don’t make it to their intended destination.
Down
- 1. A type of phishing attack aimed at high-level executives at an organization
- 2. A trial-and-error method of finding correct login credentials.
- 3. Type of attack; a threat vector that targets a specific group of users by compromising a website they frequently visit.
- 6. Acronym. A cloud security checkpoint between users and cloud providers.
- 7. A method to send emails with a forged sender address, often used to deliver spam and phishing attacks