Cybersecurity Unit 2 Terminology

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
Across
  1. 2. A machine that requests a webpage using a web browser.
  2. 5. A Wireshark data capture file that contains packet information of network traffic.
  3. 8. A network interface card is a physical component on a computer or device that provides connectivity to a network.
  4. 10. In network security, it allows or denies packets based on source and destinations addresses, ports, or protocols.
  5. 11. The arrangement of the various elements (computers,routers, switches, etc) of a network.
  6. 13. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
  7. 16. Transmission Control Protocol used to establish and maintain connections over a computer network.
  8. 17. An agreed-upon method for communication.
  9. 18. A code that defines every structure on an HTML page, such as text, images, and links. HTML tags begin with the less-than (<) character and end with greater-than (>) .
  10. 19. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
  11. 20. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it.
  12. 21. A part of a process or system that is seen by the user and typically provides functionality to the user.
  13. 22. A small local area network of computers and devices.
  14. 26. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
  15. 27. A machine that responds to a request received.
  16. 29. An identifying number for hosts and servers on the internet.
  17. 30. The buying and selling of goods or services over the internet.
  18. 33. it helps the reader of the program understand the code, especially when working on code with other people.
  19. 34. A way for a computer to identify specific programs and manage their activity.
  20. 39. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
  21. 41. A file that contains an official record of activities that occur on a computer.
  22. 42. A computer, typically one on a network.
  23. 43. Preserving the accuracy of information and validating its source.
  24. 46. A database in which data is organized into collections of similar data, called tables. It uses relationships to define how data in one table can relate to data in another table.
  25. 49. A computer that delivers files forming web pages across a network to requesting clients.
  26. 51. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running.
  27. 54. A starting point for data analysis. It is the initial data set used in later comparisons.
  28. 55. In a command, they are used to specify different variations, sometimes supplying additional input to the command or requesting different styles of output from the command.
Down
  1. 1. Ensuring that information resources and services are accessible in a timely manner.
  2. 2. Keeping sensitive information out of unwanted hands.
  3. 3. Performing a computer attack to evaluate the security of a
  4. 4. It can have two meanings in computer terminology:a) it can be a specific application or function such as email, chat, etc. b) it can refer to a specific part of an application, such as transmitting the data of a webpage
  5. 6. Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
  6. 7. The way an organization structures and organizes the information that is required by their employees and/or customers.
  7. 9. system The hardware and software used to help organize and analyze data.
  8. 10. Analyze something without interfering or affecting it.
  9. 12. Refers to the action of watching and analyzing network traffic at the packet level.
  10. 14. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.
  11. 15. A computer, typically one on a network. It can also be referred to as a machine or a system.
  12. 23. In terms of computer science, it means to increase a system's security and reduce its vulnerabilities.
  13. 24. Reverse the encryption process, making the data human-readable again.
  14. 25. system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F.
  15. 28. A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establishing a connection between
  16. 29. They are best known for developing standards in the computer and electronics industries.
  17. 31. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
  18. 32. Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used.
  19. 35. The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device.
  20. 36. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
  21. 37. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
  22. 38. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information.
  23. 40. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
  24. 44. A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
  25. 45. A media access control (MAC) addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices. The code is assigned by the manufacturer, includes their unique identification number, and never changes.
  26. 47. Often referred to as hex, it is a base-16
  27. 48. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
  28. 50. A note in a program that describes what the code is doing. Adding them is very good programming practice,
  29. 52. A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process.
  30. 53. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.