CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET E Duration :15 mins Marks:20
Across
- 3. Self-replicating program that attaches itself to files and spreads when executed.
- 8. Unauthorized access to data or systems
- 11. Malicious software that encrypts data and demands ransom
- 12. The electronic version of junk mail, often unsolicited commercial advertising
- 13. A proactive exercise searching for threats concealed within the network or IT infrastructure
- 14. Malicious software specifically designed to disrupt or damage computer systems.
- 16. Examining malware without executing it, often involving analyzing the code.
- 18. Policies and training that educate employees about risks
- 19. Technique to recover deleted or hidden files
- 20. Covertly observing a person's keystrokes or screen to obtain sensitive information.
Down
- 1. The oldest and most fundamental type of firewall that works at the network and transport layers.
- 2. Type of firewall that operates as a cloud-based service
- 4. Unauthorized email scams that trick users into revealing information
- 5. The process of collecting, analyzing, and preserving electronic evidence for investigations.
- 6. A security mechanism that creates a virtual trap to lure attackers and study their techniques
- 7. Attempt to make a system unavailable by flooding it with traffic
- 9. Exploiting vulnerabilities in web application input fields to manipulate a database.
- 10. Data describing other data, such as timestamps or authors
- 13. Malicious software disguised as a legitimate program to trick users into executing it.
- 15. A security device that filters all incoming and outgoing network packets
- 17. Network tool for capturing and analyzing traffic
