CISO Crossword Quiz - 1925

12345678910
Across
  1. 3. Face swapping, lip-syncing, Audio Overlays, Voice-Only Cloning, Full-Body Re-enactment techniques are used in which type of cyber scam
  2. 4. A software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features
  3. 7. The action or process of spoiling the appearance of a website in a cyber attack
  4. 8. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
  5. 9. The process of monitoring and capturing all data packets passing through a given network
  6. 10. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
Down
  1. 1. The unethical act of violating the privacy of an organization in order to leak internal data or confidential information
  2. 2. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  3. 5. The use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems
  4. 6. Phishing Techniques used to target senior executives of an organization