Across
- 5. Criminal activities carried out by means of computers or the internet.
- 6. The use of cyber-attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems.
- 8. Process of Maintaining regular surveillance over system & network logs.
- 9. A Ransomware attack in which the ransom asked to be paid in crypto currency to in exchange of data.
- 10. It is a form of social engineering where attackers focus on creating a fabricated scenario to steal victims’ personal information.
Down
- 1. A software designed to detect and destroy computer viruses.
- 2. The action or process of spoiling the appearance of a website in a cyber attack.
- 3. A hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
- 4. The action of keeping the cyber-attack outfalls under control or within acceptable limits.
- 7. A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes.
