CrossWord Puzzle FJ3 -17.10.25 SET B Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 4. Malware analysis that involves running the program in a controlled environment.
  2. 5. Attackers use username and password pairs from old breaches to access new accounts.
  3. 6. Gateways that provide services to inside users while protecting hosts from outside users.
  4. 9. Free software framework for scanning and managing known security vulnerabilities.
  5. 11. The process of configuring a honeypot with attractive data and apparent vulnerabilities.
  6. 13. Formal process of technical evaluation for a system's or individual's security effectiveness.
  7. 14. Forensic data layer containing file timestamps, size, author, and geolocation details.
  8. 16. Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
  9. 17. Malicious digital communication causing emotional harm.
  10. 19. Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
  11. 20. Security analysis technique that looks for statistical deviations from a security baseline
Down
  1. 1. Machine learning model used in threat hunting to find correlations in data.
  2. 2. Network security appliances that act as a barrier between trusted and untrusted networks.
  3. 3. Weaknesses in a system arising from human actions or behaviors, like weak passwords.
  4. 7. Extortion-based threat where malicious code denies access to data until a sum is paid.
  5. 8. Formal and systematic security assessment and assurance process for a computer system.
  6. 10. Tools that protect systems by detecting and eliminating a wide range of malicious software.
  7. 12. Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
  8. 15. Risks arising from individuals who misuse authorized access to compromise data or cause harm.
  9. 18. Social engineering technique that offers something enticing like free software containing malware.