Across
- 3. An email attack in which a cybercriminal attempts to disguise themselves as a trusted source..
- 6. Cybersecurity Awareness Month
- 7. A person who uses computers to gain unauthorized access to data.
- 9. A form of phishing in which an attacker uses a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious software to a smartphone.
- 10. This type of information includes your name, address, phone number, email address, bank account information, IP address, etc.
- 11. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 12. A person who commits fraud or participates in a dishonest scheme.
- 13. The practice of protecting critical systems and sensitive information from digital attacks.
- 14. A manipulation technique that exploits human error to gain private information, access or valuables.(Two words)
Down
- 1. This is the most common form of cybercrime. Roughly 90% of all data breaches start with one of these emails.
- 2. The fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to trick individuals in to revealing personal information, such as bank details and card numbers.
- 3. A sequence of words or text used to control access to a computer; similar to a password.
- 4. Facebook, Instagram, TikTok, etc.(Two words)
- 5. This type of information includes race or ethnicity, health and medical information, political or religious beliefs, etc.
- 8. The address of a webpage. Check the validity of it before clicking on it.