Cybersecurity Awareness
Across
- 7. ___ is a type of software designed to help the user's computer detect viruses and avoid them.
- 10. ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- 14. The terms "bug" and "debugging" are popularly attributed to ___.
- 15. Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
- 16. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
- 18. ___ is when attackers send malicious emails designed to trick people into falling for a scam.
- 19. ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
- 1. ___ National nodal agency for all measures to protect nation's critical information infrastructure.
- 2. ___ Advertising software can be used to spread malware.
- 3. ___ is actually considered the first computer virus?
- 4. ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
- 5. ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
- 6. ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
- 8. ___ is a type of malware that is disguised as legitimate software.
- 9. ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- 11. ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
- 12. In-order to ensure the security of the data/information, we need to ___ the data.
- 13. ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- 17. ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- 20. Which Wi-Fi communication protocol is more Secure?