CSL Module 2 Puzzle

123456789101112
Across
  1. 2. ___ Based Social Engineering refers to extraction of information using computer or any digital device
  2. 8. _____ had made many significant changes in the prevailing laws of cyber space applicable in India, one of which is regarding Cyber Cafes
  3. 9. pursue or approach stealthily
  4. 11. Attacker targets high level employee to gain access to valuable data
  5. 12. act of harming or harassing through information technology in a deliberate manner
Down
  1. 1. Step 1 of planning an Attack
  2. 3. Attempt made to physically access the device or server
  3. 4. enable hackers to exploit system vulnerabilities
  4. 5. Heroku, Force.com, Google App Engine are example of ___
  5. 6. Second Step of Social Engineering Life-cycle
  6. 7. Another name for Quid Pro Quo
  7. 10. ___ cloud infrastructure is a composition of two or more distinct cloud infrastructures