Across
- 2. mobile phone sim related social engineering attack
- 4. Type of virus which is in news for AIIMS attack.
- 6. maliciously crafted software code.
- 7. what does P stand for in VAPT Audit?
- 9. logical device used to filter network traffic
- 10. .......is the illegal access of data via voice over Internet Protocol (VoIP)
Down
- 1. term coined for unauthorized use of computer to mine cryptocurrency.
- 3. term coined for spear phishing attacks directed specifically at senior executive.
- 5. ......is a type of attack where hackers tries multiple passwords to guess the right one
- 8. Tool for stealing debit card information
