Test Your Cyber Vocabulary

1234567891011121314
Across
  1. 2. Also called malicious software
  2. 6. Buzz@IS has prescribed how many simple steps to stay safe online? (HINT: Answer in this edition itself)
  3. 7. A copy of the information held on a device (such as photos and documents) that is stored somewhere else.
  4. 9. This can slow down your computer and watch everywhere you go on the internet
  5. 10. When somebody sends an e-mail with a link to a bogus website it is called
  6. 12. Name of the attack that does not require any action from the victim.(HINT: An article on this attack was also published in a recent HP news edition.)
  7. 13. Harmful computer program
  8. 14. Encryption is a commonly used tool to achieve _________________
Down
  1. 1. Weakness in an information system
  2. 3. Full form of "T" in OTP
  3. 4. Will stand like a wall to keep intruders out
  4. 5. I have a short life; your mobile buzzes with me every time you do any financial transaction online
  5. 8. I lock the victim's computer system files and demand payment to decrypt. Who Am I?
  6. 11. Getting into someone else’s computer or device without their permission.
  7. 13. Phishing over voice call is called as _____