Across
- 5. forwarding/Automatically sending emails from one account to another, often exploited by attackers.
- 6. authentication/A security process requiring two types of identification.
- 8. targeted phishing attack aimed at specific individuals.
- 10. activity alert/Notifications for potential security breaches or unusual behaviour.
- 11. operations/Activities aimed at influencing or manipulating information for strategic purposes.
- 12. addresses/Email accounts outside an organisation’s official domain, which may pose risks.
Down
- 1. communication/Messages received without prior request, often phishing-related.
- 2. monitoring/Tracking changes to system or server settings for security purposes.
- 3. a trusted entity to deceive users.
- 4. theft/The act of stealing usernames and passwords.
- 7. awareness training/Educational programs to help users recognise phishing attacks.
- 9. deceptive offer or message designed to attract and manipulate a target.
