CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET C Duration :15 mins Marks:20

123456789101112131415161718192021
Across
  1. 2. Malicious software that encrypts data and demands ransom
  2. 4. Unauthorized access to data or systems
  3. 6. Policies and training that educate employees about risks
  4. 7. Type of firewall that operates as a cloud-based service
  5. 10. Exploiting vulnerabilities in web application input fields to manipulate a database.
  6. 12. The electronic version of junk mail, often unsolicited commercial advertising
  7. 13. Network tool for capturing and analyzing traffic
  8. 14. Attempt to make a system unavailable by flooding it with traffic
  9. 15. A security device that filters all incoming and outgoing network packets
  10. 16. Examining malware without executing it, often involving analyzing the code.
  11. 18. Technique to recover deleted or hidden files
  12. 20. A security mechanism that creates a virtual trap to lure attackers and study their techniques
  13. 21. The oldest and most fundamental type of firewall that works at the network and transport layers.
Down
  1. 1. Covertly observing a person's keystrokes or screen to obtain sensitive information.
  2. 3. The process of collecting, analyzing, and preserving electronic evidence for investigations.
  3. 5. Data describing other data, such as timestamps or authors
  4. 8. Self-replicating program that attaches itself to files and spreads when executed.
  5. 9. Unauthorized copying of trade secrets or patents
  6. 11. Malicious software disguised as a legitimate program to trick users into executing it.
  7. 17. A proactive exercise searching for threats concealed within the network or IT infrastructure
  8. 19. Unauthorized email scams that trick users into revealing information