Cyber Security Awareness

123456789101112131415161718192021222324
Across
  1. 3. - a malicious computer program that displays intrusive pop-up advertisements
  2. 6. - malware designed to deny access to files by encrypting
  3. 10. - A flaw or weakness in the computer
  4. 11. - function used to map data of arbitrary size to fixed-size values
  5. 14. - taking information and images from other people and uses them to create a new identity for themselves
  6. 16. - deceiving, pressuring or manipulating people into sending information to wrong people
  7. 17. - covert method of bypassing normal authentication or encryption in a computer
  8. 20. - exploit of a vulnerability
  9. 21. - personal data leak
  10. 22. - unauthorized alteration of personal data
  11. 23. - attackers pretend to be an authentic user
  12. 24. - Hackers demand ransom in this currency
Down
  1. 1. - install a backdoor in the infected computer
  2. 2. - vulnerability in a computer system that was previously unknown to its developers or anyone capable of mitigating it
  3. 4. - website made unavailable to legitimate user
  4. 5. - group of computers which have been infected and under the control of a malicious actor
  5. 7. - software tool designed to take advantage of a flaw in a computer system
  6. 8. - data is complete, trustworthy
  7. 9. - Malicious software which is installed in your system
  8. 12. - updates that address security vulnerabilities within a program or product
  9. 13. - India's first comprehensive data protection law
  10. 14. - hiding or coding information so that only the person a message was intended for can read it
  11. 15. - person who attempts to gain unauthorized access to a system
  12. 18. - right to control how your information is viewed and used
  13. 19. - Browser for the dark web