CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 2. Criminal use of the internet or other electronic means to persistently harass an individual.
  2. 4. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. 5. Policy-based accept or deny of network traffic.
  4. 7. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. 10. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. 11. Gaining unauthorized access to a secured area by following an authorized person.
  7. 13. Process of transforming information into a scrambled format to secure it.
  8. 14. Security documentation that details system resource usage by users and processes for auditing.
  9. 19. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  10. 20. Code examination performed without running the malicious program.
Down
  1. 1. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  2. 3. Matching known patterns of threats against security event data to find potential matches.
  3. 6. Cloud-based vulnerability management platform with scanning and reporting.
  4. 8. Attacks that overwhelm a target system or network with a flood of traffic
  5. 9. Injecting malicious scripts into webpages viewed by other users
  6. 12. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. 15. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  8. 16. Attack that uses a list of commonly used words or phrases to guess a password.
  9. 17. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. 18. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.