Across
- 3. The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- 4. A security mechanism requiring two or more forms of verification before granting access to a system
- 5. A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- 8. A social engineering attack in which the fraudster builds a false sense of trust with the victim
- 9. The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
Down
- 1. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- 2. An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
- 4. Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- 6. A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
- 7. A technology that creates a secure connection over a public network, ensuring privacy and data integrity
