CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 3. Policy-based accept or deny of network traffic.
  2. 7. Code examination performed without running the malicious program.
  3. 11. Gaining unauthorized access to a secured area by following an authorized person.
  4. 12. Injecting malicious scripts into webpages viewed by other users
  5. 13. Cloud-based vulnerability management platform with scanning and reporting.
  6. 14. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. 15. Process of transforming information into a scrambled format to secure it.
  8. 16. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  9. 19. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  10. 20. Matching known patterns of threats against security event data to find potential matches.
Down
  1. 1. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  2. 2. Attack that uses a list of commonly used words or phrases to guess a password.
  3. 4. Security documentation that details system resource usage by users and processes for auditing.
  4. 5. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  5. 6. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. 8. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  7. 9. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  8. 10. Graphic object used in reports to visualize the correlation between an object and its performance.
  9. 17. Attacks that overwhelm a target system or network with a flood of traffic
  10. 18. Criminal use of the internet or other electronic means to persistently harass an individual.