Across
- 1. Multi Factor Authentication
- 3. When you are unsure a URL is real
- 5. What not to do for unknown texts
- 7. What to do to numbers of unwanted texts
- 8. A classic in person attack
- 10. Phone based social engineering
- 12. malicious software
- 13. A way to harvest data
- 14. Subtle signs of danger
- 15. Bypassing physical access controls
- 19. Phishing that targets users
- 20. How Colonial Pipeline was attacked
- 24. Email based social engineering
Down
- 2. Social Media used to gather info
- 4. Used to separate parts of a URL
- 6. The art of deceiving
- 9. Scrambles data in a computer
- 11. What you hover over in an email
- 16. Text based Social Engineering
- 17. Button in Outlook to report emails
- 18. A website address
- 21. Who does cybercrime target?
- 22. Type of drive used to store data
- 23. Used for Man in the middle attacks
