Across
- 1. A technology that creates a secure connection over a public network, ensuring privacy and data integrity
- 6. A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- 7. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- 10. An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
Down
- 2. A social engineering attack in which the fraudster builds a false sense of trust with the victim
- 3. Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- 4. The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- 5. A security mechanism requiring two or more forms of verification before granting access to a system
- 8. The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
- 9. A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
