CISO Crossword Quiz - 1825
Across
- 2. Passwords that contain easy-to-guess information like common words, personal information like names or dates, simple sequences, or easily guessed keyboard patterns called ____ password
- 6. All the data about a person generated while interacting with the internet, from browsing history and social media posts to online purchases and app usage called _____
- 7. The process of sending indiscriminately unsolicited bulk messages/emails to a large number of internet users with the intention of scamming is called ____
- 8. Cybercriminals creating sophisticated scams like advanced phishing, deepfakes etc by using a technology that enable computers to simulate human-like intelligence
Down
- 1. A security feature where the first eight digits of your Aadhaar number are hidden and only the last four digits are displayed, enhancing privacy and reducing the risk of misuse of your Aadhaar data
- 2. A cyber scam in which fraudsters convince the victim to merge the WhatsApp registration OTP call to access the OTP & to take over the account of victim
- 3. Often called the weakest link in the cyber security chain because of fear, greed and lack of awareness
- 4. is a type of malware that downloads onto a computer disguised as a legitimate program
- 5. Scammers exploit vulnerabilities in connected devices that are embedded with sensors and software for the purpose of connecting and exchanging data with other devices over the internet
- 7. It's crucial to exercise caution and verify the sender's legitimacy before taking any action in email ___ attacks