Across
- 4. deceptive practices to misuse financial institutions and their services for personal gain or to commit other crimes
- 5. cybersecurity tactic where attackers send emails with a forged sender address, making it appear as if the email originated from a legitimate source
Down
- 1. the act of identifying and exploiting weaknesses in a computer system or network to gain unauthorized access or control
- 2. a type of malicious software (malware) designed to replicate and spread between computers, causing damage or disruption.
- 3. the use of technology to harass, threaten, embarrass, or target another person.
