Across
- 3. Stuxnet primarily targets which type of systems
- 4. Which XDR product caused a Blue Screen of Death (BSOD) on Microsoft Windows devices
- 6. Which security key is a physical device that acts as a second factor for user authentication.
- 7. National Nodal Agency for responding to computer security incidents as and when they occur
- 8. Botnet that was responsible for a series of DDoS attacks in 2016
- 9. Digital activity that intentionally targets or harms women, exploiting their personal information, privacy, and dignity
- 13. Patch Management Solution used in all PCs of GAIL
- 17. Chinese researchers successfully cracked which encryption using quantum computers from D-Wave
- 18. What does letter “I” in the cyber security term CIA stands for
- 19. Type of rogue WIFI access point used for Wi-Fi phishing
- 20. Network protocol that collects and analyzes IP traffic data to monitor network
- 21. Security standard that specifically helps in safeguarding Payment Card Data
Down
- 1. Which Windows security feature provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices
- 2. BCP stands for
- 5. The tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- 10. What is EU’s new data protection law
- 11. Sarah receives a WhatsApp text from Emily, claiming to be a bank executive, urging her to click a link to verify her compromised account. Type of WhatsApp phishing tactic used is
- 12. Type of compromise of devices like smartphones and tablets which use the same cable for charging and data transfer, typically a USB cable
- 14. What networking architecture that GAIL recently migrated to that enables more efficient network management?
- 15. The practice of encrypting information to protect its confidentiality, integrity, authentication, and non-repudiation
- 16. A cyber scam where fraudsters, posing as law enforcement officials, make video calls claiming the victim or their family is involved in criminal activity
- 22. Act of stealing the card information rather than the card itself
