Test Your Cyber Vocabulary
Across
- 2. Also called malicious software
- 6. Buzz@IS has prescribed how many simple steps to stay safe online? (HINT: Answer in this edition itself)
- 7. A copy of the information held on a device (such as photos and documents) that is stored somewhere else.
- 9. This can slow down your computer and watch everywhere you go on the internet
- 10. When somebody sends an e-mail with a link to a bogus website it is called
- 12. Name of the attack that does not require any action from the victim.(HINT: An article on this attack was also published in a recent HP news edition.)
- 13. Harmful computer program
- 14. Encryption is a commonly used tool to achieve _________________
Down
- 1. Weakness in an information system
- 3. Full form of "T" in OTP
- 4. Will stand like a wall to keep intruders out
- 5. I have a short life; your mobile buzzes with me every time you do any financial transaction online
- 8. I lock the victim's computer system files and demand payment to decrypt. Who Am I?
- 11. Getting into someone else’s computer or device without their permission.
- 13. Phishing over voice call is called as _____