CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII Sem FT3 -17.10.25 SET B Duration :15 mins Marks:20
Across
- 4. Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- 7. Gateways that provide services to inside users while protecting hosts from outside users.
- 9. Malware analysis that involves running the program in a controlled environment.
- 12. Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- 13. Formal and systematic security assessment and assurance process for a computer system.
- 14. Attackers use username and password pairs from old breaches to access new accounts.
- 16. Network security appliances that act as a barrier between trusted and untrusted networks.
- 17. Security analysis technique that looks for statistical deviations from a security baseline
- 19. Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- 20. Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- 1. Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- 2. Machine learning model used in threat hunting to find correlations in data.
- 3. Tools that protect systems by detecting and eliminating a wide range of malicious software.
- 5. The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- 6. Extortion-based threat where malicious code denies access to data until a sum is paid.
- 8. Social engineering technique that offers something enticing like free software containing malware.
- 10. Malicious digital communication causing emotional harm.
- 11. Forensic data layer containing file timestamps, size, author, and geolocation details.
- 15. Formal process of technical evaluation for a system's or individual's security effectiveness.
- 18. Free software framework for scanning and managing known security vulnerabilities.
