CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET E Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 3. Self-replicating program that attaches itself to files and spreads when executed.
  2. 8. Unauthorized access to data or systems
  3. 11. Malicious software that encrypts data and demands ransom
  4. 12. The electronic version of junk mail, often unsolicited commercial advertising
  5. 13. A proactive exercise searching for threats concealed within the network or IT infrastructure
  6. 14. Malicious software specifically designed to disrupt or damage computer systems.
  7. 16. Examining malware without executing it, often involving analyzing the code.
  8. 18. Policies and training that educate employees about risks
  9. 19. Technique to recover deleted or hidden files
  10. 20. Covertly observing a person's keystrokes or screen to obtain sensitive information.
Down
  1. 1. The oldest and most fundamental type of firewall that works at the network and transport layers.
  2. 2. Type of firewall that operates as a cloud-based service
  3. 4. Unauthorized email scams that trick users into revealing information
  4. 5. The process of collecting, analyzing, and preserving electronic evidence for investigations.
  5. 6. A security mechanism that creates a virtual trap to lure attackers and study their techniques
  6. 7. Attempt to make a system unavailable by flooding it with traffic
  7. 9. Exploiting vulnerabilities in web application input fields to manipulate a database.
  8. 10. Data describing other data, such as timestamps or authors
  9. 13. Malicious software disguised as a legitimate program to trick users into executing it.
  10. 15. A security device that filters all incoming and outgoing network packets
  11. 17. Network tool for capturing and analyzing traffic