Gone Phishing

12345678910111213
Across
  1. 2. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  2. 7. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  3. 9. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  4. 10. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  5. 12. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  6. 13. Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. 1. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  2. 3. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  3. 4. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  4. 5. A type of fraud that targets high-profile end users.
  5. 6. Crime conducted via the Internet or some other computer network.
  6. 8. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  7. 10. A secret word or phrase known only to you.
  8. 11. What tells you that the website is secure in the browser.