Across
- 2. An attack that use fraudulent emails that appear to be from trusted sources to try to trick victims into divulging sensitive data over email. (Hint: --a----)
- 5. A mechanism of assigning the user account to an unknown user. (Hint: -----s-------)
- 8. It is a malicious program triggered when a logical condition is met. (Hint: ----c----)
- 9. Name the hacker who uses hacking to send social, religious, and political, etc messages. (Hint: ---k------)
- 11. A program provides a means for ethical hackers to test an organization's website, mobile app, or software for security bugs. (Hint: ---b-----)
- 12. It is a malware type in which security system is bypassed to access a system. (Hint: ---k----)
Down
- 1. It is one of the common attacking techniques used by hackers to get critical data. (Hint: -----j------)
- 3. It is an open source platform and most widely used SAST tool. (Hint: ----r----)
- 4. It is a fake computer system that behaves like a real system and attracts hackers to attack it. (Hint: --n-----)
- 6. A malicious software that allows an unauthorized user to have access to a computer and restricted areas of its software. (Hint: ---t---)
- 7. An information security standard for organizations that handles branded credit cards from the major card schemes. (Hint: ---d--)
- 10. A program that will serve pop up ads, can change browser's homepage and bombard your device with advertisements. (Hint: -d----)
