CrossWord Puzzle 21CSE49T CYBERCRIMES AND CYBERSECURITY IV YEAR / VII SEM FT3 -17.10.25 SET E DURATION : 15 MINS MARK 20
Across
- 5. Malicious software that encrypts data and demands ransom
- 6. The electronic version of junk mail, often unsolicited commercial advertising
- 11. Policies and training that educate employees about risks
- 12. Covertly observing a person's keystrokes or screen to obtain sensitive information.
- 15. The oldest and most fundamental type of firewall that works at the network and transport layers.
- 17. Exploiting vulnerabilities in web application input fields to manipulate a database.
- 18. Technique to recover deleted or hidden files
- 19. Attempt to make a system unavailable by flooding it with traffic
- 20. Unauthorized email scams that trick users into revealing information
Down
- 1. Network tool for capturing and analyzing traffic
- 2. A security device that filters all incoming and outgoing network packets
- 3. A proactive exercise searching for threats concealed within the network or IT infrastructure
- 4. Self-replicating program that attaches itself to files and spreads when executed.
- 7. Malicious software specifically designed to disrupt or damage computer systems.
- 8. Examining malware without executing it, often involving analyzing the code.
- 9. Data describing other data, such as timestamps or authors
- 10. The process of collecting, analyzing, and preserving electronic evidence for investigations.
- 13. Unauthorized access to data or systems
- 14. Malicious software disguised as a legitimate program to trick users into executing it.
- 16. Type of firewall that operates as a cloud-based service
- 21. A security mechanism that creates a virtual trap to lure attackers and study their techniques
