Across
- 4. Which secured number is not required for receiving money through UPI?
- 7. What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
- 9. What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
- 10. What disguised link leads to a malicious webpage?
Down
- 1. What method uses a QR code to lead users to fake webpage/payment sites?
- 2. What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
- 3. What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
- 5. What should be strong and unique to protect your online accounts?
- 6. What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
- 8. What attack tricks people into clicking something different than they think?
