CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 1. Data describing other data, such as timestamps or authors
  2. 3. An illegal intrusion into a computer system or network
  3. 4. Legal process of collecting and analyzing digital evidence
  4. 5. Unauthorized email scams that trick users into revealing information
  5. 7. The verification procedure to demonstrate that the network meets security requirements
  6. 8. Software that records keystrokes, potentially capturing sensitive login credentials.
  7. 9. Deceptive emails or messages impersonating trusted entities to steal sensitive information
  8. 11. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  9. 12. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  10. 15. Network tool for capturing and analyzing traffic
  11. 17. Potential events or circumstances that can cause harm to an organization's assets.
  12. 20. Technology used by NGFW to detect and block malware
Down
  1. 2. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  2. 6. A central security resource where multiple virtual traps are monitored (One word).
  3. 10. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  4. 13. Process of identifying, assessing, and mitigating threats
  5. 14. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  6. 16. Programs designed to record personal information, typically undesired software
  7. 18. Malicious software specifically designed to disrupt or damage computer systems
  8. 19. Firewall Firewall type that provides unified policy across distributed networks