CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 2. Cloud-based vulnerability management platform with scanning and reporting.
  2. 4. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  3. 6. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  4. 8. Security documentation that details system resource usage by users and processes for auditing.
  5. 9. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  6. 12. Attacks that overwhelm a target system or network with a flood of traffic
  7. 16. Policy-based accept or deny of network traffic.
  8. 17. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  9. 19. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. 20. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
  1. 1. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. 3. Injecting malicious scripts into webpages viewed by other users
  3. 5. Matching known patterns of threats against security event data to find potential matches.
  4. 7. Code examination performed without running the malicious program.
  5. 10. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. 11. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. 13. Criminal use of the internet or other electronic means to persistently harass an individual.
  8. 14. Gaining unauthorized access to a secured area by following an authorized person.
  9. 15. Attack that uses a list of commonly used words or phrases to guess a password.
  10. 18. Process of transforming information into a scrambled format to secure it.