CyberCrime Crossword

1234567891011121314151617181920212223
Across
  1. 3. An agency that strengthens the existing anti-money laundering and counter-terrorism policies by the EU.
  2. 5. A ransomware gang that the $50m ransom demand made against PC company Acer.
  3. 9. One of 2021’s much impactful emergent ransom crews originated in September.
  4. 11. A security Camp supported by the NSA being largest girls-only residential camp in the country.
  5. 14. In this cybercrime, hackers pose as vendors, suppliers, or customers, they are able to hijack money exchanges and redirect those to their own accounts.
  6. 16. A tool developed by Symantec comes with cloud-based analytics that automatically adapts to new attack tactics by delivering continuous attack detection, plus the ongoing addition of new attack analytics.
  7. 17. A family of encrypting ransomware that infects the master boot record.
  8. 19. Cyber-safety and cybersecurity awareness handle maintained by Ministry of Home Affairs, Government of India.
  9. 21. The first person ever to be convicted for committing a cybercrime hacked which organization?
  10. 22. A defense practice that aims to lure attackers by distributing a collection of traps and decoys across a network.
  11. 23. Identify and track the origin of data, software, and/or hardware elements.
Down
  1. 1. Born in 1847 and made use of scientific study to head criminal investigations.
  2. 2. Space Layout Randomization) used in cybercrime investigation.
  3. 4. a tool that supports KASLR (Kernel
  4. 6. A cybercrime in which a person or entity intentionally misappropriates the assets entrusted to them.
  5. 7. it is tool being developed to allow authorities visual access to hidden files on the Xbox hard drive.
  6. 8. It is a technique used to consistently trick an adversary during a cyber-attack.
  7. 10. The first computer virus was created for research purposes was named _____.
  8. 12. An attacker that can give attackers remote access to a corporate environment, which leads to network search of intellectual properties or cryptolock systems.
  9. 13. India’s first woman cybercrime investigator.
  10. 15. A cybercrime in which another party's computing resources are hijacked to mine cryptocurrency.
  11. 18. A compromised computer under the control of an attacker used to perform malicious attacks.
  12. 20. info that can be of vital importance to the outcome of legal proceedings or investigations.