Across
- 2. All the data about a person generated while interacting with the internet, from browsing history and social media posts to online purchases and app usage called _______
- 5. The process of sending indiscriminately unsolicited bulk messages/emails to a large number of internet users with the intention of scamming is called ______
- 6. Cybercriminals creating sophisticated scams like advanced phishing, deepfakes etc. by using a technology that enable computers to simulate human-like intelligence is called ______
- 7. ______ often called the weakest link in the cyber security chain because of fear, greed and lack of awareness
- 8. ______ is a cyber scam in which fraudsters convince the victim to merge the WhatsApp registration OTP call to access the OTP & to take over the WhatsApp account of victim
Down
- 1. The “C” in the C-I-A Triad stands for ______
- 3. ______ is a type of malware that downloads onto a computer disguised as a legitimate program/software
- 4. ______ is a technique where the first eight digits of your Aadhaar number are hidden and only the last four digits are displayed, enhancing privacy and reducing the risk of misuse of your Aadhaar data
- 5. To pose or pretend to be another person in email by forging the sender address of an email to make it appear legitimate is called Email ______
- 8. Passwords that contain easy-to-guess information like common words, personal information like names or dates, simple sequences, or easily guessed keyboard patterns called ______ password
