Phising

123456789101112
Across
  1. 5. forwarding/Automatically sending emails from one account to another, often exploited by attackers.
  2. 6. authentication/A security process requiring two types of identification.
  3. 8. targeted phishing attack aimed at specific individuals.
  4. 10. activity alert/Notifications for potential security breaches or unusual behaviour.
  5. 11. operations/Activities aimed at influencing or manipulating information for strategic purposes.
  6. 12. addresses/Email accounts outside an organisation’s official domain, which may pose risks.
Down
  1. 1. communication/Messages received without prior request, often phishing-related.
  2. 2. monitoring/Tracking changes to system or server settings for security purposes.
  3. 3. a trusted entity to deceive users.
  4. 4. theft/The act of stealing usernames and passwords.
  5. 7. awareness training/Educational programs to help users recognise phishing attacks.
  6. 9. deceptive offer or message designed to attract and manipulate a target.