Puzzle No. 3

123456789101112131415
Across
  1. 3. Derived from the terms Quick Response and Phishing wherein threat actors use Quick Response or QR codes to carry out their modus operandi.
  2. 5. Authentication factor - Things you have.
  3. 7. Important life event which is commonly used as a password.
  4. 9. Malicious aggressive software that puts unwanted advertising on your computer screen.
  5. 11. Security technology that requires multiple methods of authentication.
  6. 12. Form of malware that locks your files or your device until a sum of money is paid to the attacker.
  7. 13. "It's easy to stay ____ online."
  8. 14. A type of malware that are designed to damage a computer device by corrupting data, reformatting hard disk, or completely shutting down your system.
  9. 15. Authentication factor - Things you know.
Down
  1. 1. Authentication factor - Things you are.
  2. 2. Individuals who transfer money or other goods on behalf of others, and are a crucial component to the success of financial crimes, particularly money laundering for funds earned through illegal means such as drugs, fraud, or human trafficking.
  3. 4. A type of malware which is designed to spy on or track your browsing habits and internet activity.
  4. 6. Microsoft’s cloud-based storage platform which allows DBP employees share files and folders to others.
  5. 8. A type of malware that is disguised as a normal, harmless file or app designed to trick you into downloading malware.
  6. 10. A type of malware which spread over computer networks by exploiting operating system vulnerabilities.