CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 12. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. 13. Gaining unauthorized access to a secured area by following an authorized person.
  3. 16. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  4. 17. Injecting malicious scripts into webpages viewed by other users
  5. 18. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. 20. Security documentation that details system resource usage by users and processes for auditing.
Down
  1. 1. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. 2. Matching known patterns of threats against security event data to find potential matches.
  3. 3. Process of transforming information into a scrambled format to secure it.
  4. 4. Criminal use of the internet or other electronic means to persistently harass an individual.
  5. 5. Attack that uses a list of commonly used words or phrases to guess a password.
  6. 6. Attacks that overwhelm a target system or network with a flood of traffic
  7. 7. Cloud-based vulnerability management platform with scanning and reporting.
  8. 8. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  9. 9. Code examination performed without running the malicious program.
  10. 10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  11. 11. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  12. 14. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  13. 15. Policy-based accept or deny of network traffic.
  14. 19. Graphic object used in reports to visualize the correlation between an object and its performance.