CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET F Duration :15 mins Marks:20
Across
- 3. Data describing other data, such as timestamps or authors
- 4. Process of identifying, assessing, and mitigating threats
- 8. The verification procedure to demonstrate that the network meets security requirements
- 10. Technology used by NGFW to detect and block malware
- 11. Unauthorized email scams that trick users into revealing information
- 13. An illegal intrusion into a computer system or network
- 16. A central security resource where multiple virtual traps are monitored (One word).
- 18. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- 19. A security mechanism or virtual trap intended to be compromised to capture attacker data.
- 20. Malicious software specifically designed to disrupt or damage computer systems
Down
- 1. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- 2. Network tool for capturing and analyzing traffic
- 5. Programs designed to record personal information, typically undesired software
- 6. Deceptive emails or messages impersonating trusted entities to steal sensitive information
- 7. Potential events or circumstances that can cause harm to an organization's assets.
- 9. Legal process of collecting and analyzing digital evidence
- 12. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- 14. Firewall Firewall type that provides unified policy across distributed networks
- 15. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- 17. Software that records keystrokes, potentially capturing sensitive login credentials.
