CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET C Duration :15 mins Marks:20
Across
- 2. Malicious software that encrypts data and demands ransom
- 4. Unauthorized access to data or systems
- 6. Policies and training that educate employees about risks
- 7. Type of firewall that operates as a cloud-based service
- 10. Exploiting vulnerabilities in web application input fields to manipulate a database.
- 12. The electronic version of junk mail, often unsolicited commercial advertising
- 13. Network tool for capturing and analyzing traffic
- 14. Attempt to make a system unavailable by flooding it with traffic
- 15. A security device that filters all incoming and outgoing network packets
- 16. Examining malware without executing it, often involving analyzing the code.
- 18. Technique to recover deleted or hidden files
- 20. A security mechanism that creates a virtual trap to lure attackers and study their techniques
- 21. The oldest and most fundamental type of firewall that works at the network and transport layers.
Down
- 1. Covertly observing a person's keystrokes or screen to obtain sensitive information.
- 3. The process of collecting, analyzing, and preserving electronic evidence for investigations.
- 5. Data describing other data, such as timestamps or authors
- 8. Self-replicating program that attaches itself to files and spreads when executed.
- 9. Unauthorized copying of trade secrets or patents
- 11. Malicious software disguised as a legitimate program to trick users into executing it.
- 17. A proactive exercise searching for threats concealed within the network or IT infrastructure
- 19. Unauthorized email scams that trick users into revealing information