crossword1

12345678910111213141516171819202122
Across
  1. 3. Stuxnet primarily targets which type of systems
  2. 4. Which XDR product caused a Blue Screen of Death (BSOD) on Microsoft Windows devices
  3. 6. Which security key is a physical device that acts as a second factor for user authentication.
  4. 7. National Nodal Agency for responding to computer security incidents as and when they occur
  5. 8. Botnet that was responsible for a series of DDoS attacks in 2016
  6. 9. Digital activity that intentionally targets or harms women, exploiting their personal information, privacy, and dignity
  7. 13. Patch Management Solution used in all PCs of GAIL
  8. 17. Chinese researchers successfully cracked which encryption using quantum computers from D-Wave
  9. 18. What does letter “I” in the cyber security term CIA stands for
  10. 19. Type of rogue WIFI access point used for Wi-Fi phishing
  11. 20. Network protocol that collects and analyzes IP traffic data to monitor network
  12. 21. Security standard that specifically helps in safeguarding Payment Card Data
Down
  1. 1. Which Windows security feature provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices
  2. 2. BCP stands for
  3. 5. The tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
  4. 10. What is EU’s new data protection law
  5. 11. Sarah receives a WhatsApp text from Emily, claiming to be a bank executive, urging her to click a link to verify her compromised account. Type of WhatsApp phishing tactic used is
  6. 12. Type of compromise of devices like smartphones and tablets which use the same cable for charging and data transfer, typically a USB cable
  7. 14. What networking architecture that GAIL recently migrated to that enables more efficient network management?
  8. 15. The practice of encrypting information to protect its confidentiality, integrity, authentication, and non-repudiation
  9. 16. A cyber scam where fraudsters, posing as law enforcement officials, make video calls claiming the victim or their family is involved in criminal activity
  10. 22. Act of stealing the card information rather than the card itself