Cyber Security Awareness
Across
- 3. The act of attempting to crack passwords or keys through exhaustive attempts
- 5. Indian cybersecurity nodal agency
- 7. A person who gains unauthorized access to data
- 10. An Act to provide for the processing of digital personal data
- 11. Phishing attack that uses QR codes to deceive victims and steal sensitive information
- 13. Malicious tool that records keystrokes
- 16. Cyberattack where a cybercriminal pretends to be a trusted entity or individual to gain unauthorised access to sensitive systems, data
- 18. Cyber cell governed by MHA
- 20. Ministry responsible for cybersecurity in India
- 21. An Attack technique used by cybercriminals to steal sensitive financial information from individuals and businesses without their knowledge
- 24. Cybercriminals pose as law enforcement officers or government officials and contact individuals
- 25. Fix released to remove software vulnerabilities
Down
- 1. A type of software designed to damage or disrupt systems
- 2. A fake site mimicking a legitimate one
- 4. Data encrypted to prevent unauthorized access
- 5. Telecom Regulatory Authority of India (TRAI) portal, which helps users report fraudulent phone numbers
- 6. Attack where users are tricked into giving up confidential info
- 8. Type of attack exploiting human psychology
- 9. Unwanted software designed to throw ads
- 12. Powerful technology merging "deep learning" and "fake“, can be used to create incredibly realistic manipulated media
- 14. Telecom Regulatory Authority of India (TRAI) portal, which helps users to report suspicious incoming international calls
- 15. India's initiative for citizen cyber hygiene and digital cleanliness
- 17. Type of software that tracks user activity without consent
- 19. Cyber Crisis Management Plan
- 20. Multi-Factor Authentication
- 21. Unwanted or unsolicited emails, often used for phishing
- 22. Organization responsible for critical infra protection in India
- 23. Indian law governing IT offences