Cybersecurity

12345678910
Across
  1. 2. Code red is a type of computer _______.
  2. 4. Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
  3. 5. In ethical hacking and cyber security, there are ______types of scanning.
  4. 6. what is transformed with the help of a cipher algorithm.
  5. 10. The technique used to hide information inside a picture.
Down
  1. 1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
  2. 3. Oldest phone hacking technique used by hackers to make free calls.
  3. 7. The malware which does not replicate or clone through an infection.
  4. 8. The debian based OS which has 2 virtual machines and focuses on preserving user's data.
  5. 9. A type of attack which uses a fraudulent server with a relay address.