Across
- 3. Derived from the terms Quick Response and Phishing wherein threat actors use Quick Response or QR codes to carry out their modus operandi.
- 5. Authentication factor - Things you have.
- 7. Important life event which is commonly used as a password.
- 9. Malicious aggressive software that puts unwanted advertising on your computer screen.
- 11. Security technology that requires multiple methods of authentication.
- 12. Form of malware that locks your files or your device until a sum of money is paid to the attacker.
- 13. "It's easy to stay ____ online."
- 14. A type of malware that are designed to damage a computer device by corrupting data, reformatting hard disk, or completely shutting down your system.
- 15. Authentication factor - Things you know.
Down
- 1. Authentication factor - Things you are.
- 2. Individuals who transfer money or other goods on behalf of others, and are a crucial component to the success of financial crimes, particularly money laundering for funds earned through illegal means such as drugs, fraud, or human trafficking.
- 4. A type of malware which is designed to spy on or track your browsing habits and internet activity.
- 6. Microsoft’s cloud-based storage platform which allows DBP employees share files and folders to others.
- 8. A type of malware that is disguised as a normal, harmless file or app designed to trick you into downloading malware.
- 10. A type of malware which spread over computer networks by exploiting operating system vulnerabilities.
