Across
- 2. Scrambling of text in order to ensure the security of data/ information
- 4. Existence of weakness in a system or network
- 6. Socially or politically motivated hackers
- 8. Software designed to help the user's computer detect viruses & avoid them
- 10. Hackers with main motive to gain financial profit by doing cyber crimes
- 11. Emails sent to trick users to reveal their sensitive information.
Down
- 1. Technique of Hiding data behind a photo
- 3. Phishing Techniques used to target CEO,CFO etc.
- 5. Just going behind an authorized person into a secured area
- 7. Sending bulk messages by abusing electronic messaging system
- 9. Unauthorized softwares installed on computer to gather sensitive information
