Across
- 1. A payment device that is placed on a credit card reader at gas pump terminals or automated teller machines to steal personal and financial information.
- 7. When a cybercriminal steals assets such as a laptop or paper documents that result in a loss.
- 8. An incident that exposes confidential or protected information that may result in the loss of your Social Security number, bank account or credit card number.
- 9. Deception is used to manipulate individuals into providing personal or confidential information that can be used for fraudulent purposes.
- 10. A malicious email linked to state-affiliated actors where cybercriminals may profit at your expense by accessing your key personal data.
Down
- 2. Malicious software that holds computer files hostage until the victim pays to unlock the files.
- 3. A remote breach attack that occurs in small businesses’ and restaurants’ point-of-sale terminals.
- 4. The fraudulent practice of making phone calls or leaving voice messages claiming to be from reputable companies in order to trick individuals to reveal personal information.
- 5. Cyber attackers use a fake email to gain more information about a target and steal the target’s credentials.
- 6. Software that has malicious intent that may be downloaded and installed on your computer, laptop or device without you knowing.
