Cyber Security Unit-5 Puzzle

123456789101112131415
Across
  1. 4. Analysis that runs malware to observe its actions.
  2. 7. Tool/framework for analyzing memory dumps.
  3. 9. Volatile storage analyzed during forensic investigations.
  4. 13. Scientific investigation of digital evidence.
  5. 15. Collection of scripts/tools to aid memory analysis.
Down
  1. 1. Processes or data intentionally concealed by attackers.
  2. 2. Assigning identifiers or categories to malicious code.
  3. 3. Analysis that observes behavior without executing malware.
  4. 5. Decoy system designed to attract and study attackers.
  5. 6. Malicious software analyzed in automated systems.
  6. 8. Set of tools or methods used in forensic analysis.
  7. 10. Copying physical memory for analysis.
  8. 11. Person performing memory or malware analysis.
  9. 12. Running program or task, sometimes hidden by malware.
  10. 14. Analysis performed by a system without human intervention.