Puzzle No. 1

123456789101112131415
Across
  1. 4. A type of malware which spread over computer networks by exploiting operating system vulnerabilities.
  2. 5. Individuals who transfer money or other goods on behalf of others, and are a crucial component to the success of financial crimes, particularly money laundering for funds earned through illegal means such as drugs, fraud, or human trafficking.
  3. 8. Form of malware that locks your files or your device until a sum of money is paid to the attacker.
  4. 10. A type of malware which is designed to spy on or track your browsing habits and internet activity.
  5. 13. Authentication factor - Things you are.
  6. 14. Malicious aggressive software that puts unwanted advertising on your computer screen.
  7. 15. Security technology that requires multiple methods of authentication.
Down
  1. 1. Microsoft’s cloud-based storage platform which allows DBP employees share files and folders to others.
  2. 2. Authentication factor - Things you have.
  3. 3. Derived from the terms Quick Response and Phishing wherein threat actors use Quick Response or QR codes to carry out their modus operandi.
  4. 6. Authentication factor - Things you know.
  5. 7. "It's easy to stay ____ online."
  6. 9. A type of malware that are designed to damage a computer device by corrupting data, reformatting hard disk, or completely shutting down your system.
  7. 11. Important life event which is mistakenly used as a passcode.
  8. 12. A type of malware that is disguised as a normal, harmless file or app designed to trick you into downloading malware.