CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET F Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 3. Data describing other data, such as timestamps or authors
  2. 4. Process of identifying, assessing, and mitigating threats
  3. 8. The verification procedure to demonstrate that the network meets security requirements
  4. 10. Technology used by NGFW to detect and block malware
  5. 11. Unauthorized email scams that trick users into revealing information
  6. 13. An illegal intrusion into a computer system or network
  7. 16. A central security resource where multiple virtual traps are monitored (One word).
  8. 18. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  9. 19. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  10. 20. Malicious software specifically designed to disrupt or damage computer systems
Down
  1. 1. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  2. 2. Network tool for capturing and analyzing traffic
  3. 5. Programs designed to record personal information, typically undesired software
  4. 6. Deceptive emails or messages impersonating trusted entities to steal sensitive information
  5. 7. Potential events or circumstances that can cause harm to an organization's assets.
  6. 9. Legal process of collecting and analyzing digital evidence
  7. 12. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  8. 14. Firewall Firewall type that provides unified policy across distributed networks
  9. 15. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  10. 17. Software that records keystrokes, potentially capturing sensitive login credentials.