Second
Across
- 3. Force Attempting every possible password combination
- 4. Person or group harassing others online
- 8. Software designed to secretly monitor your activity
- 10. Malicious code hidden inside another program
- 11. Engineering Technique to trick people into revealing confidential information
- 14. Security technique that converts data into unreadable form
- 15. Hygiene Set of online habits to maintain security and privacy
Down
- 1. Copy of important files kept separately for safety
- 2. Horse Malicious program disguised as legitimate software
- 5. Program that records every keystroke you type
- 6. Fraud tactic to make a site look like another
- 7. Official Indian body responding to cybersecurity incidents
- 8. Injection Data theft by manipulating a website’s database queries
- 9. Act 2000 Law in India dealing with cyber crimes
- 12. Cyber attack exploiting a vulnerability before it’s fixed
- 13. Device or software used to secure online privacy by masking IP