CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20
Across
- 1. Data describing other data, such as timestamps or authors
- 3. An illegal intrusion into a computer system or network
- 4. Legal process of collecting and analyzing digital evidence
- 5. Unauthorized email scams that trick users into revealing information
- 7. The verification procedure to demonstrate that the network meets security requirements
- 8. Software that records keystrokes, potentially capturing sensitive login credentials.
- 9. Deceptive emails or messages impersonating trusted entities to steal sensitive information
- 11. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- 12. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- 15. Network tool for capturing and analyzing traffic
- 17. Potential events or circumstances that can cause harm to an organization's assets.
- 20. Technology used by NGFW to detect and block malware
Down
- 2. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- 6. A central security resource where multiple virtual traps are monitored (One word).
- 10. A security mechanism or virtual trap intended to be compromised to capture attacker data.
- 13. Process of identifying, assessing, and mitigating threats
- 14. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- 16. Programs designed to record personal information, typically undesired software
- 18. Malicious software specifically designed to disrupt or damage computer systems
- 19. Firewall Firewall type that provides unified policy across distributed networks