CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20

12345678910111213141516171819
Across
  1. 1. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  2. 5. Code examination performed without running the malicious program.
  3. 6. Attacks that overwhelm a target system or network with a flood of traffic
  4. 8. Injecting malicious scripts into webpages viewed by other users
  5. 10. Process of transforming information into a scrambled format to secure it.
  6. 11. Matching known patterns of threats against security event data to find potential matches.
  7. 13. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  8. 15. Criminal use of the internet or other electronic means to persistently harass an individual.
  9. 16. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. 17. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  11. 18. Cloud-based vulnerability management platform with scanning and reporting.
  12. 19. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
  1. 2. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. 3. Policy-based accept or deny of network traffic.
  3. 4. Attack that uses a list of commonly used words or phrases to guess a password.
  4. 6. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. 7. Gaining unauthorized access to a secured area by following an authorized person.
  6. 9. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  7. 12. Security documentation that details system resource usage by users and processes for auditing.
  8. 14. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.