Across
- 3. A list of blocked email addresses.
- 4. A cyber-attack method where the cyber attacker leaves a voice mail posing as a legitimate institution to trick targets into calling back and revealing their personal information.
- 6. A targeted cybercrime that contacts a target by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- 7. Process of converting plaintext information or data into a ciphertext code to prevent unauthorized access.
- 8. Information identifying an individual that if lost, compromised, or disclosed could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual.
- 9. Information that can be used to identify an individual alone or with other information.
Down
- 1. Information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified.
- 2. The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via email, telephone, or text message.
- 5. A scam in which the criminal takes on the identity of a victim and then attempts to live and act as the stolen identity.
- 6. A mobile device-oriented attack where the cyber attacker sends you a text message with a fake link that leads to a malicious website.
