New Activity
Play Crossword Puzzle
1 An attack that tricks you into giving sensitive information either in person, over the phone, online, or in email​ (two words)
2 A fraudulent attempt to obtain sensitive information via text messages
3 A secret code used to authenticate and access a system
4 A type of artificial intelligence used to create convincing images, audio, and video hoaxes, typically used maliciously or to spread false information.
5 A deceptive technique where cybercriminals manipulate voice communications to trick victims
6 An attack involving deceptive advertisements to spread malware
7 A form of social engineering that entices recipients to click a link or open a malicious attachment to reveal sensitive information
8 A cyber attack that blocks access to a system until a a form of payment is made
9 A method of encoding data to protect it from unauthorized access
10 The MS Outlook button used to report suspicious emails to the Security Operations Center (two words)
11 A type of malicious software designed to harm computer systems
11
8
10
9
1
7
6
3
5
2
4
1 The process of verifying the identity of a user or device to ensure that only authorized individuals or systems can access resources.
2 Malicious software designed to harm or exploit computer systems, including viruses, worms, trojans, ransomware, and spyware.
3 A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity.
4 A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
5 The process of converting data into a format that cannot be easily understood by unauthorized users.
6 A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity.
7 A weakness or flaw in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause harm.
8 An intentional malicious act that targets computer systems, networks, or devices to disrupt, damage, or gain unauthorized access to information.
4
1
2
3
6
8
5
7