Page 62 - Cyber Safety C-8
P. 62

21 st
                                                                                                 Century   #Critical Thinking
                                                                                                  Skills


                  Solve the crossword!
                  Across
                  3.  A psychological manipulation technique used to deceive individuals into divulging confidential or
                     sensitive information.
                  5.  A sophisticated modular malware primarily used as a banking Trojan but later evolved into a
                     platform for delivering multiple malware strains.
                  Down

                  1.  A category of malware that encrypts a user’s data or restricts system access, demanding a
                     monetary ransom for restoration.
                  2.  A deceptive communication strategy where attackers send fraudulent emails or messages to trick
                     recipients into revealing credentials or financial information.
                                                                                            1
                  4.  risk that aims to harm a computer, smartphone, or online account.      R





                                                                                                          2
                                                                                                           P














                                       3
                                        S                                                                      G
                                                                                                           G








                                  5
                                    E                     T












                                                 T



                   60   Computer Science - VIII
   57   58   59   60   61   62   63   64   65   66   67