Across
- 2. Software or hardware that inspects network traffic and blocks suspicious packets.
- 5. A digital certificate used to authenticate the identity of individuals or organizations in online transactions.
- 9. The process of converting data into a coded format to prevent unauthorized access.
- 12. A security principle stating users should only have access to resources essential to their role.
- 13. India's national agency for critical information infrastructure protection.
Down
- 1. Exploiting human psychology to trick individuals into divulging confidential information.
- 3. Technology that allows banks to instantly verify customer identity using biometrics.
- 4. A term for unwanted software that often comes bundled with legitimate programs.
- 6. A specialized government agency that handles computer security incidents in India.
- 7. A type of cyberattack that involves overwhelming a system with traffic to disrupt service.
- 8. The apex body in India responsible for policy making, regulation, and development of the securities market.
- 10. India's real-time gross settlement system for large value interbank transactions.
- 11. The act of creating fake websites or login pages to steal credentials.
