Security Quiz
Across
- 2. Risk identified for the project should be documented and tracked in
- 5. Phishing is a form of
- 10. The major ransomeware trojan targeting windows in 2014
- 11. This gives the contact numbers of all stakeholders
- 12. this attack can be deployed by infusing a malicious code in website's comment section(abbreviation)
Down
- 1. lack of access control policy is a
- 3. Technology to hide information inside a picture
- 4. Using this for doing competitive information gathering is a crime
- 6. Compromising confidential information comes under
- 7. This automates an action or attack so that repetitive tasks are done at a faster rate
- 8. A malicious program do not replicate automatically
- 9. Attackers could steal this to achieve illegitimate accessing to online accounts and disturbs the personal information