CISO Crossword Puzzle 0623

12345678910
Across
  1. 5. Criminal activities carried out by means of computers or the internet.
  2. 6. The use of cyber-attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems.
  3. 8. Process of Maintaining regular surveillance over system & network logs.
  4. 9. A Ransomware attack in which the ransom asked to be paid in crypto currency to in exchange of data.
  5. 10. It is a form of social engineering where attackers focus on creating a fabricated scenario to steal victims’ personal information.
Down
  1. 1. A software designed to detect and destroy computer viruses.
  2. 2. The action or process of spoiling the appearance of a website in a cyber attack.
  3. 3. A hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
  4. 4. The action of keeping the cyber-attack outfalls under control or within acceptable limits.
  5. 7. A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes.