Across
- 3. Face swapping, lip-syncing, Audio Overlays, Voice-Only Cloning, Full-Body Re-enactment techniques are used in which type of cyber scam
- 4. A software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features
- 7. The action or process of spoiling the appearance of a website in a cyber attack
- 8. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
- 9. The process of monitoring and capturing all data packets passing through a given network
- 10. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
Down
- 1. The unethical act of violating the privacy of an organization in order to leak internal data or confidential information
- 2. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
- 5. The use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems
- 6. Phishing Techniques used to target senior executives of an organization
