test

123456789101112131415161718
Across
  1. 4. Equivalent ot EU Data Protection Bill in India
  2. 5. These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
  3. 9. A digital form of social engineering to deceive individuals into providing sensitive information
  4. 10. The process of transforming plaintext into ciphertext
  5. 13. Old way of breaking phone
  6. 15. Computer Malicious Program
  7. 17. attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
  8. 18. in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
  1. 1. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
  2. 2. secure online service that allows users to connect remotely to another network
  3. 3. spyware software that records every keystroke made on a computer’s keyboard
  4. 6. security framework that controls access to computer resources, enforces policies, and audits usage
  5. 7. algorithms to create convincing fake videos or audio recordings
  6. 8. Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
  7. 11. type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
  8. 12. type of attack which uses a fraudulent server with a relay address
  9. 14. model that forms the basis for the development of security systems
  10. 16. A capability to limit network traffic between networks and/or information systems