Across
- 3. Extra Layer of security that requires users to provide multiple forms of verification before they can access a system or account
- 6. method or code used to take advantage of that weakness
- 7. A method transforming the original data into an unreadable format.
- 8. Unauthorized access to confidential or sensitive data.
- 11. System that prevents unauthorized access to or from a private network.
- 12. Converting data into a secure format to prevent unauthorized access.
- 16. A network of compromised computers controlled by attackers to launch cyber attacks.
Down
- 1. Weakness in a system that can be exploited by threats.
- 2. A malware that encrypts data and demands payment for decryption.
- 4. A division under DICT Cybersecurity Bureau responsible for receiving, reviewing and responding to computer security incident reports and activities
- 5. Software update designed to fix security vulnerabilities
- 9. A phishing attack that uses text messages to trick individual into divulging personal information.
- 10. A type of cyberattack where malicious actors attempt to trick individuals into revealing sensitive information
- 13. Attached agency of DICT created upon the approval of Cybercrime Prevention Act of 2012; this agency is a part of the inter-Agency Response Center where you can report cyber incidents through hotline 1326.
- 14. One of the frontline services of the DICT that ensures secure data Transactions.
- 15. Attached agency of DICT Mandated to administer and implement the Data Privacy Act of 2012; the country's privacy watchdog.
