Cyber Security Awareness

12345678910111213141516171819202122232425
Across
  1. 3. The act of attempting to crack passwords or keys through exhaustive attempts
  2. 5. Indian cybersecurity nodal agency
  3. 7. A person who gains unauthorized access to data
  4. 10. An Act to provide for the processing of digital personal data
  5. 11. Phishing attack that uses QR codes to deceive victims and steal sensitive information
  6. 13. Malicious tool that records keystrokes
  7. 16. Cyberattack where a cybercriminal pretends to be a trusted entity or individual to gain unauthorised access to sensitive systems, data
  8. 18. Cyber cell governed by MHA
  9. 20. Ministry responsible for cybersecurity in India
  10. 21. An Attack technique used by cybercriminals to steal sensitive financial information from individuals and businesses without their knowledge
  11. 24. Cybercriminals pose as law enforcement officers or government officials and contact individuals
  12. 25. Fix released to remove software vulnerabilities
Down
  1. 1. A type of software designed to damage or disrupt systems
  2. 2. A fake site mimicking a legitimate one
  3. 4. Data encrypted to prevent unauthorized access
  4. 5. Telecom Regulatory Authority of India (TRAI) portal, which helps users report fraudulent phone numbers
  5. 6. Attack where users are tricked into giving up confidential info
  6. 8. Type of attack exploiting human psychology
  7. 9. Unwanted software designed to throw ads
  8. 12. Powerful technology merging "deep learning" and "fake“, can be used to create incredibly realistic manipulated media
  9. 14. Telecom Regulatory Authority of India (TRAI) portal, which helps users to report suspicious incoming international calls
  10. 15. India's initiative for citizen cyber hygiene and digital cleanliness
  11. 17. Type of software that tracks user activity without consent
  12. 19. Cyber Crisis Management Plan
  13. 20. Multi-Factor Authentication
  14. 21. Unwanted or unsolicited emails, often used for phishing
  15. 22. Organization responsible for critical infra protection in India
  16. 23. Indian law governing IT offences