Security Quiz

123456789101112
Across
  1. 2. Risk identified for the project should be documented and tracked in
  2. 5. Phishing is a form of
  3. 10. The major ransomeware trojan targeting windows in 2014
  4. 11. This gives the contact numbers of all stakeholders
  5. 12. this attack can be deployed by infusing a malicious code in website's comment section(abbreviation)
Down
  1. 1. lack of access control policy is a
  2. 3. Technology to hide information inside a picture
  3. 4. Using this for doing competitive information gathering is a crime
  4. 6. Compromising confidential information comes under
  5. 7. This automates an action or attack so that repetitive tasks are done at a faster rate
  6. 8. A malicious program do not replicate automatically
  7. 9. Attackers could steal this to achieve illegitimate accessing to online accounts and disturbs the personal information