Share Focus Mode

Cybersecurity Awareness

1234567891011121314151617181920
Across
  1. 7. ___ is a type of software designed to help the user's computer detect viruses and avoid them.
  2. 10. ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  3. 14. The terms "bug" and "debugging" are popularly attributed to ___.
  4. 15. Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
  5. 16. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  6. 18. ___ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. 19. ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. 1. ___ National nodal agency for all measures to protect nation's critical information infrastructure.
  2. 2. ___ Advertising software can be used to spread malware.
  3. 3. ___ is actually considered the first computer virus?
  4. 4. ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
  5. 5. ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  6. 6. ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
  7. 8. ___ is a type of malware that is disguised as legitimate software.
  8. 9. ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  9. 11. ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  10. 12. In-order to ensure the security of the data/information, we need to ___ the data.
  11. 13. ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  12. 17. ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  13. 20. Which Wi-Fi communication protocol is more Secure?