CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET C Duration :15 mins Marks:20
Across
- 2. The process of collecting, analyzing, and preserving electronic evidence for investigations.
- 4. Covertly observing a person's keystrokes or screen to obtain sensitive information.
- 5. Type of firewall that operates as a cloud-based service
- 7. Examining malware without executing it, often involving analyzing the code.
- 8. A security device that filters all incoming and outgoing network packets
- 12. The oldest and most fundamental type of firewall that works at the network and transport layers.
- 14. Attempt to make a system unavailable by flooding it with traffic
- 16. Unauthorized email scams that trick users into revealing information
- 18. Malicious software that encrypts data and demands ransom
- 19. A security mechanism that creates a virtual trap to lure attackers and study their techniques
Down
- 1. Network tool for capturing and analyzing traffic
- 3. The electronic version of junk mail, often unsolicited commercial advertising
- 4. Exploiting vulnerabilities in web application input fields to manipulate a database.
- 6. Policies and training that educate employees about risks
- 9. Data describing other data, such as timestamps or authors
- 10. Unauthorized access to data or systems
- 11. Self-replicating program that attaches itself to files and spreads when executed.
- 13. A proactive exercise searching for threats concealed within the network or IT infrastructure
- 15. Technique to recover deleted or hidden files
- 17. Malicious software disguised as a legitimate program to trick users into executing it.
