CrossWord Puzzle 21CSE49T CYBERCRIMES AND CYBERSECURITY IV YEAR / VII SEM FT3 -17.10.25 SET E DURATION : 15 MINS MARK 20

123456789101112131415161718192021
Across
  1. 5. Malicious software that encrypts data and demands ransom
  2. 6. The electronic version of junk mail, often unsolicited commercial advertising
  3. 11. Policies and training that educate employees about risks
  4. 12. Covertly observing a person's keystrokes or screen to obtain sensitive information.
  5. 15. The oldest and most fundamental type of firewall that works at the network and transport layers.
  6. 17. Exploiting vulnerabilities in web application input fields to manipulate a database.
  7. 18. Technique to recover deleted or hidden files
  8. 19. Attempt to make a system unavailable by flooding it with traffic
  9. 20. Unauthorized email scams that trick users into revealing information
Down
  1. 1. Network tool for capturing and analyzing traffic
  2. 2. A security device that filters all incoming and outgoing network packets
  3. 3. A proactive exercise searching for threats concealed within the network or IT infrastructure
  4. 4. Self-replicating program that attaches itself to files and spreads when executed.
  5. 7. Malicious software specifically designed to disrupt or damage computer systems.
  6. 8. Examining malware without executing it, often involving analyzing the code.
  7. 9. Data describing other data, such as timestamps or authors
  8. 10. The process of collecting, analyzing, and preserving electronic evidence for investigations.
  9. 13. Unauthorized access to data or systems
  10. 14. Malicious software disguised as a legitimate program to trick users into executing it.
  11. 16. Type of firewall that operates as a cloud-based service
  12. 21. A security mechanism that creates a virtual trap to lure attackers and study their techniques