Across
- 1. Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)
- 4. A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
- 5. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
- 8. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
- 9. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
- 10. The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
- 11. Process of verifying a user identity before granting access
Down
- 2. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
- 3. A software developed by hackers to steal data and damage or destroy computer systems
- 6. An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
- 7. Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
- 12. Unauthorised access to data by exploiting a weakness in the IT system
