Across
- 1. A system used to verify that a user is human and not a computer bot.
- 4. A saved copy of data used to restore in case of data loss.
- 5. Software designed to infiltrate or damage computer systems.
- 9. Small piece of data stored on a user's computer by the web browser while browsing a website.
- 11. Not a digital bird, but someone overly paranoid about online security!
- 13. A less-than-proficient hacker, maybe more of a couch potato.
- 14. Secure connection between your device and the internet.
- 15. Software designed to identify and stop malicious software.
- 16. A collection of software and tools to make phishing campaigns easier for attackers.
- 17. A network of private computers infected with malicious software and controlled as a group.
- 20. Malicious entities or individuals who conduct harmful cyber operations.
- 23. Malicious software that records every keystroke to secretly gather personal information.
- 24. Targeted phishing attempts directed at specific individuals or companies.
Down
- 2. A secret combination, often alphanumeric, used for authentication.
- 3. Unsolicited and irrelevant messages sent over the internet.
- 6. Confirming the truth of an attribute of a single piece of data or an entity.
- 7. A trap set to detect, deflect, or counteract unauthorized use of information systems.
- 8. Voice-based phishing where attackers use phone calls to deceive victims.
- 10. Phishing attacks that are executed via SMS.
- 12. A deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.
- 18. Process of converting information to code to prevent unauthorized access.
- 19. AI-generated fake content, often video, that looks convincingly real.
- 20. An authentication method that requires two separate pieces of evidence.
- 21. Imitating a trustworthy source in an attempt to deceive.
- 22. An encrypted online environment not indexed by traditional search engines.
