Across
- 3. When an attacker tries to get you to reveal information over the phone.
- 4. A type of malware that locks or exposes your information unless you pay a ransom.
- 6. Software that is designed to do damage or perform unwanted actions on a computer system.
- 8. When someone gains access to an area they aren't supposed to be in by following behind other people.
- 9. Stronger than a typical password, this is a sentence that can include any combination of characters, punctuation, and spaces.
- 10. When a cyber criminal sends fake emails or links to gather information or spread malware.
- 11. Manipulating caller ID or an email address to make a call or email look like it's coming from someone else.
Down
- 1. A type of malware that secretly tracks your keystrokes.
- 2. A security system designed to monitor and prevent unauthorized access to a network.
- 3. A flaw in software or a system that that leaves it open to cyber attack.
- 5. The process of converting data to an unrecognizable format so only authorized people can access it, similar to a secret code.
- 7. A type of phishing that targets the "big fish", such as senior leaders or other high profile individuals.
