Cyber Security Unit-5 Puzzle

1234567891011121314
Across
  1. 1. Analysis that observes behavior without executing malware.
  2. 4. Analysis that runs malware to observe its actions.
  3. 10. Person performing memory or malware analysis.
  4. 11. Set of tools or methods used in forensic analysis.
  5. 12. Collection of scripts/tools to aid memory analysis.
  6. 13. Assigning identifiers or categories to malicious code.
  7. 14. Scientific investigation of digital evidence.
Down
  1. 1. Running program or task, sometimes hidden by malware.
  2. 2. Volatile storage analyzed during forensic investigations.
  3. 3. Processes or data intentionally concealed by attackers.
  4. 5. Copying physical memory for analysis.
  5. 6. Decoy system designed to attract and study attackers.
  6. 7. Malicious software analyzed in automated systems.
  7. 8. Analysis performed by a system without human intervention.
  8. 9. Tool/framework for analyzing memory dumps.