Across
- 2. ___ Based Social Engineering refers to extraction of information using computer or any digital device
- 8. _____ had made many significant changes in the prevailing laws of cyber space applicable in India, one of which is regarding Cyber Cafes
- 9. pursue or approach stealthily
- 11. Attacker targets high level employee to gain access to valuable data
- 12. act of harming or harassing through information technology in a deliberate manner
Down
- 1. Step 1 of planning an Attack
- 3. Attempt made to physically access the device or server
- 4. enable hackers to exploit system vulnerabilities
- 5. Heroku, Force.com, Google App Engine are example of ___
- 6. Second Step of Social Engineering Life-cycle
- 7. Another name for Quid Pro Quo
- 10. ___ cloud infrastructure is a composition of two or more distinct cloud infrastructures
