CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20
Across
- 6. Attack that uses a list of commonly used words or phrases to guess a password.
- 9. Injecting malicious scripts into webpages viewed by other users
- 11. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- 12. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- 15. Matching known patterns of threats against security event data to find potential matches.
- 16. Gaining unauthorized access to a secured area by following an authorized person.
- 17. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- 20. Policy-based accept or deny of network traffic.
Down
- 1. Graphic object used in reports to visualize the correlation between an object and its performance.
- 2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- 3. Process of transforming information into a scrambled format to secure it.
- 4. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- 5. Security documentation that details system resource usage by users and processes for auditing.
- 7. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- 8. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- 10. Code examination performed without running the malicious program.
- 13. Criminal use of the internet or other electronic means to persistently harass an individual.
- 14. Cloud-based vulnerability management platform with scanning and reporting.
- 18. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- 19. Attacks that overwhelm a target system or network with a flood of traffic