Across
- 3. Scam that tricks people into revealing sensitive information via email by impersonating a trusted entity.
- 5. SMS phishing scam
- 8. Security incidents where unauthorized access exposes sensitive data
- 9. Malicious program that replicates and spreads, infecting systems to cause harm.
- 11. An attack that overloads a system or network to disrupt its normal functioning
- 12. Deliberate deception for financial or personal gain.
- 14. Converting data into a secure, unreadable format to protect it from unauthorized access.
- 16. Unauthorized system access
- 18. Block untrusted communication
- 19. Verifying identity credentials
Down
- 1. Fake websites that act as a legit business and ask for personal information
- 2. Unique biological individuals identification
- 4. Voice-based phishing that tricks people into revealing sensitive information over phone calls
- 6. Granting access permissions
- 7. False defamatory statement
- 10. Set of rules or guidelines that govern decisions and actions
- 13. Cyber weapon virus
- 15. Restricts Computer use without authorization
- 16. Use of hacking to promote political or social causes
- 17. Exposing unethical behavior
