security awareness CW1

12345678910
Across
  1. 2. Sourav created a password for his online banking account using only lowercase letters. However, his account was compromised, and someone had transferred all his money to another account. Later, Sourav found out that the attacker had used a brute force attack to crack his weak password. What could Sourav have done to make her password stronger and more secure?
  2. 5. "Aradhna received a call from someone claiming to be from the IRS, informing her that she owed back taxes and needed to make an immediate payment. The person instructed Jessica to transfer the money to a specific account to avoid legal action. Aradhna complied and transferred the funds as instructed. However, later Aradhna discovered that the call was a ______, and she had lost her money.
  3. 9. The CFO of a large organization received an urgent email from the CEO, asking her to transfer a large sum of money to an external account as soon as possible. The email contained the CEO's email signature and appeared to be legitimate. The email also emphasized the urgency of the transfer and warned the CFO not to disclose the request to anyone else in the organization. Without verifying the authenticity of the email, the CFO proceeded to transfer the funds to the external account. What type of attack did the CFO fall victim to?
  4. 10. Pankaj created a password for his online banking account, which was easy to remember, but also easy to guess. One day, Pankaj discovered that someone had gained access to his account and made unauthorized transactions. Later, Pankaj found out that the attacker had used a _____ attack to crack his weak password. What type of attack is this likely to be?
Down
  1. 1. Navdeep received an email from someone claiming to be a representative from his company's IT department. The email stated that there was a critical security update that Navdeep needed to install immediately, and it contained a link to a website. Navdeep clicked on the link and followed the instructions, but after the update installed, all of his files became encrypted and he was asked to pay a ransom to regain access. What type of attack is this likely to be?
  2. 3. Vikram received an email from his boss asking her to purchase some gift cards for a client as a thank-you gesture. The email instructed Vikram to purchase the gift cards immediately and email the card details to the client. Vikram quickly purchased the gift cards and sent the details to the email address provided in the email. However, he later discovered that the email had not actually been sent by his boss, but rather by an impostor who had impersonated her boss's email address. What type of attack did Vikram fall victim to?
  3. 4. "Yash received an email from a popular online retailer, offering her a discount on her next purchase. The email looked legitimate, and Yash was excited to save some money. The email instructed Yash to click on a link and enter her credit card information to claim the discount. However, when Yash clicked on the link and entered her information, he later discovered that the email was a _____ attempt, and his credit card information had been stolen. What type of attack is this likely to be?
  4. 6. "Sid downloaded a free software program from a website, which promised to speed up his computer. However, after installing the software, John noticed that his computer was running slower and displaying strange pop-up messages. Later, Sid discovered that the software contained ______, which had infected his computer. What had infected Sid's computer?
  5. 7. Rakesh received a text message from his bank stating that there had been some suspicious activity on his account and asking him to call the customer service number provided. When Rakesh called the number, he was asked to provide his account number and some personal information for verification. However, before he could provide this information, he was asked to enter a code that had been sent to his phone via text message. What security feature was the bank using to protect Rakesh's account?
  6. 8. Ritish was browsing the internet on his personal computer when he noticed that he was seeing a lot of ads for the same product she had recently searched for on another website. He wondered how the ads knew what he had been searching for, and did some research. He found out that the website he had visited had used cookies to track his browsing history and then sold that information to advertising companies. Over here Ritish's ____ was compramised.