Second

123456789101112131415
Across
  1. 3. Force Attempting every possible password combination
  2. 4. Person or group harassing others online
  3. 8. Software designed to secretly monitor your activity
  4. 10. Malicious code hidden inside another program
  5. 11. Engineering Technique to trick people into revealing confidential information
  6. 14. Security technique that converts data into unreadable form
  7. 15. Hygiene Set of online habits to maintain security and privacy
Down
  1. 1. Copy of important files kept separately for safety
  2. 2. Horse Malicious program disguised as legitimate software
  3. 5. Program that records every keystroke you type
  4. 6. Fraud tactic to make a site look like another
  5. 7. Official Indian body responding to cybersecurity incidents
  6. 8. Injection Data theft by manipulating a website’s database queries
  7. 9. Act 2000 Law in India dealing with cyber crimes
  8. 12. Cyber attack exploiting a vulnerability before it’s fixed
  9. 13. Device or software used to secure online privacy by masking IP