CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET C Duration :15 mins Marks:20

12345678910111213141516171819
Across
  1. 2. The process of collecting, analyzing, and preserving electronic evidence for investigations.
  2. 4. Covertly observing a person's keystrokes or screen to obtain sensitive information.
  3. 5. Type of firewall that operates as a cloud-based service
  4. 7. Examining malware without executing it, often involving analyzing the code.
  5. 8. A security device that filters all incoming and outgoing network packets
  6. 12. The oldest and most fundamental type of firewall that works at the network and transport layers.
  7. 14. Attempt to make a system unavailable by flooding it with traffic
  8. 16. Unauthorized email scams that trick users into revealing information
  9. 18. Malicious software that encrypts data and demands ransom
  10. 19. A security mechanism that creates a virtual trap to lure attackers and study their techniques
Down
  1. 1. Network tool for capturing and analyzing traffic
  2. 3. The electronic version of junk mail, often unsolicited commercial advertising
  3. 4. Exploiting vulnerabilities in web application input fields to manipulate a database.
  4. 6. Policies and training that educate employees about risks
  5. 9. Data describing other data, such as timestamps or authors
  6. 10. Unauthorized access to data or systems
  7. 11. Self-replicating program that attaches itself to files and spreads when executed.
  8. 13. A proactive exercise searching for threats concealed within the network or IT infrastructure
  9. 15. Technique to recover deleted or hidden files
  10. 17. Malicious software disguised as a legitimate program to trick users into executing it.