Page 62 - Cyber Safety C-8
P. 62
21 st
Century #Critical Thinking
Skills
Solve the crossword!
Across
3. A psychological manipulation technique used to deceive individuals into divulging confidential or
sensitive information.
5. A sophisticated modular malware primarily used as a banking Trojan but later evolved into a
platform for delivering multiple malware strains.
Down
1. A category of malware that encrypts a user’s data or restricts system access, demanding a
monetary ransom for restoration.
2. A deceptive communication strategy where attackers send fraudulent emails or messages to trick
recipients into revealing credentials or financial information.
1
4. risk that aims to harm a computer, smartphone, or online account. R
2
P
3
S G
G
5
E T
T
60 Computer Science - VIII

