CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20
Across
- 2. A security mechanism or virtual trap intended to be compromised to capture attacker data.
- 6. Data describing other data, such as timestamps or authors
- 8. Firewall type that provides unified policy across distributed networks
- 10. Unauthorized email scams that trick users into revealing information
- 12. Potential events or circumstances that can cause harm to an organization's assets.
- 15. Network tool for capturing and analyzing traffic
- 16. A central security resource where multiple virtual traps are monitored (One word).
- 18. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- 20. Technology used by NGFW to detect and block malware
Down
- 1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- 3. An illegal intrusion into a computer system or network
- 4. The verification procedure to demonstrate that the network meets security requirements
- 5. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- 7. Legal process of collecting and analyzing digital evidence
- 9. Process of identifying, assessing, and mitigating threats
- 11. Malicious software specifically designed to disrupt or damage computer systems
- 13. Programs designed to record personal information, typically undesired software
- 14. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- 17. Software that records keystrokes, potentially capturing sensitive login credentials.
- 19. Deceptive emails or messages impersonating trusted entities to steal sensitive information
