CyberCrime Crossword
Across
- 3. An agency that strengthens the existing anti-money laundering and counter-terrorism policies by the EU.
- 5. A ransomware gang that the $50m ransom demand made against PC company Acer.
- 9. One of 2021’s much impactful emergent ransom crews originated in September.
- 11. A security Camp supported by the NSA being largest girls-only residential camp in the country.
- 14. In this cybercrime, hackers pose as vendors, suppliers, or customers, they are able to hijack money exchanges and redirect those to their own accounts.
- 16. A tool developed by Symantec comes with cloud-based analytics that automatically adapts to new attack tactics by delivering continuous attack detection, plus the ongoing addition of new attack analytics.
- 17. A family of encrypting ransomware that infects the master boot record.
- 19. Cyber-safety and cybersecurity awareness handle maintained by Ministry of Home Affairs, Government of India.
- 21. The first person ever to be convicted for committing a cybercrime hacked which organization?
- 22. A defense practice that aims to lure attackers by distributing a collection of traps and decoys across a network.
- 23. Identify and track the origin of data, software, and/or hardware elements.
Down
- 1. Born in 1847 and made use of scientific study to head criminal investigations.
- 2. Space Layout Randomization) used in cybercrime investigation.
- 4. a tool that supports KASLR (Kernel
- 6. A cybercrime in which a person or entity intentionally misappropriates the assets entrusted to them.
- 7. it is tool being developed to allow authorities visual access to hidden files on the Xbox hard drive.
- 8. It is a technique used to consistently trick an adversary during a cyber-attack.
- 10. The first computer virus was created for research purposes was named _____.
- 12. An attacker that can give attackers remote access to a corporate environment, which leads to network search of intellectual properties or cryptolock systems.
- 13. India’s first woman cybercrime investigator.
- 15. A cybercrime in which another party's computing resources are hijacked to mine cryptocurrency.
- 18. A compromised computer under the control of an attacker used to perform malicious attacks.
- 20. info that can be of vital importance to the outcome of legal proceedings or investigations.