CISO Crossword Quiz - 0824

123456789101112
Across
  1. 1. Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)
  2. 4. A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
  3. 5. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
  4. 8. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
  5. 9. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  6. 10. The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
  7. 11. Process of verifying a user identity before granting access
Down
  1. 2. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
  2. 3. A software developed by hackers to steal data and damage or destroy computer systems
  3. 6. An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
  4. 7. Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
  5. 12. Unauthorised access to data by exploiting a weakness in the IT system