Across
- 2. Any incident that results in unauthorized access to computer data, applications, networks or devices. It results in information being accessed without authorization
- 4. Program that maliciously takes advantage of vulnerabilities or security flaws in software
- 6. The act of disguising a communication from an unknown source as being from a known, trusted source by impersonating a domain
- 7. Two or more ways of authentication e.g. pincodes,OTPs
Down
- 1. The process of protecting information or data by scrambling it in such a way that only the parties who have the key to unscramble it can access it
- 3. Fraudulent Email sent to people to share their personal info by pretending to be legitimate business or person
- 5. A type of malware or malicious software that can replicate rapidly and spread across devices within a network
- 6. Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages