CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 2. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. 6. Data describing other data, such as timestamps or authors
  3. 8. Firewall type that provides unified policy across distributed networks
  4. 10. Unauthorized email scams that trick users into revealing information
  5. 12. Potential events or circumstances that can cause harm to an organization's assets.
  6. 15. Network tool for capturing and analyzing traffic
  7. 16. A central security resource where multiple virtual traps are monitored (One word).
  8. 18. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. 20. Technology used by NGFW to detect and block malware
Down
  1. 1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. 3. An illegal intrusion into a computer system or network
  3. 4. The verification procedure to demonstrate that the network meets security requirements
  4. 5. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. 7. Legal process of collecting and analyzing digital evidence
  6. 9. Process of identifying, assessing, and mitigating threats
  7. 11. Malicious software specifically designed to disrupt or damage computer systems
  8. 13. Programs designed to record personal information, typically undesired software
  9. 14. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. 17. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. 19. Deceptive emails or messages impersonating trusted entities to steal sensitive information