CrossWord Puzzle Course Code & Title: 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20

1234567891011121314151617181920
Across
  1. 4. Weaknesses in a system arising from human actions or behaviors, like weak passwords.
  2. 7. Gateways that provide services to inside users while protecting hosts from outside users.
  3. 9. Malware analysis that involves running the program in a controlled environment.
  4. 12. Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
  5. 13. Formal and systematic security assessment and assurance process for a computer system.
  6. 14. Attackers use username and password pairs from old breaches to access new accounts.
  7. 16. Network security appliances that act as a barrier between trusted and untrusted networks.
  8. 17. Security analysis technique that looks for statistical deviations from a security baseline
  9. 19. Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
  10. 20. Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
  1. 1. Risks arising from individuals who misuse authorized access to compromise data or cause harm.
  2. 2. Machine learning model used in threat hunting to find correlations in data.
  3. 3. Tools that protect systems by detecting and eliminating a wide range of malicious software.
  4. 5. The process of configuring a honeypot with attractive data and apparent vulnerabilities.
  5. 6. Extortion-based threat where malicious code denies access to data until a sum is paid.
  6. 8. Social engineering technique that offers something enticing like free software containing malware.
  7. 10. Malicious digital communication causing emotional harm.
  8. 11. Forensic data layer containing file timestamps, size, author, and geolocation details.
  9. 15. Formal process of technical evaluation for a system's or individual's security effectiveness.
  10. 18. Free software framework for scanning and managing known security vulnerabilities.