How well do you know security lingo?

1234567891011
Across
  1. 3. When an attacker tries to get you to reveal information over the phone.
  2. 4. A type of malware that locks or exposes your information unless you pay a ransom.
  3. 6. Software that is designed to do damage or perform unwanted actions on a computer system.
  4. 8. When someone gains access to an area they aren't supposed to be in by following behind other people.
  5. 9. Stronger than a typical password, this is a sentence that can include any combination of characters, punctuation, and spaces.
  6. 10. When a cyber criminal sends fake emails or links to gather information or spread malware.
  7. 11. Manipulating caller ID or an email address to make a call or email look like it's coming from someone else.
Down
  1. 1. A type of malware that secretly tracks your keystrokes.
  2. 2. A security system designed to monitor and prevent unauthorized access to a network.
  3. 3. A flaw in software or a system that that leaves it open to cyber attack.
  4. 5. The process of converting data to an unrecognizable format so only authorized people can access it, similar to a secret code.
  5. 7. A type of phishing that targets the "big fish", such as senior leaders or other high profile individuals.