Across
- 4. Equivalent ot EU Data Protection Bill in India
- 5. These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
- 9. A digital form of social engineering to deceive individuals into providing sensitive information
- 10. The process of transforming plaintext into ciphertext
- 13. Old way of breaking phone
- 15. Computer Malicious Program
- 17. attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
- 18. in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
- 1. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
- 2. secure online service that allows users to connect remotely to another network
- 3. spyware software that records every keystroke made on a computer’s keyboard
- 6. security framework that controls access to computer resources, enforces policies, and audits usage
- 7. algorithms to create convincing fake videos or audio recordings
- 8. Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
- 11. type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
- 12. type of attack which uses a fraudulent server with a relay address
- 14. model that forms the basis for the development of security systems
- 16. A capability to limit network traffic between networks and/or information systems
