CSE167 Terminology
Across
- 4. 2 Words A technique used to manipulate and deceive people in the real world to gain sensitive and private information.
- 6. 2 Words. an act that sought to curb unsolicited commercial emails
- 8. a cyber attack used to obtain information like passwords and bank info.
- 9. 2 Words. An attack that is done over an online format.
- 13. Any weakness in an asset or security protection which would allow for a threat to cause harm.
- 14. things that can protect your defense points (methods)
- 15. 2 Words. attacker tries to crack the password by submitting various combinations until the correct one is found
- 16. A form of cyber attack that floods a service with malicious traffic or data to shut it down
- 19. A form of malware that monitors user activities and reports them to an external party.
- 20. From the CIA triad: Information kept private and secure
- 21. 2 Words. key points which should be identified to protect
- 22. A collection of computers with malware that allows a hacker to run software used for illegal purposes.
- 24. A copy of the system or networks data for file restoration or archival purposes
- 26. Study of secure communication technics in the presence of third parties
Down
- 1. a set of programs that tell a computer to perform a task
- 2. A malicious application or script that can be used to take advantage of a vulnerability
- 3. From the CIA triad: Data not modified (deleted or added)
- 5. Possibility of suffering loss. Areas include financial, legal, strategic, and security.
- 7. 4 Words A type of attack where an attacker secretly intercepts and possibly alters the communications between two parties.
- 10. 3 Words. A game in which keys are intentionally hidden within vulnerable programs or websites.
- 11. a tool that allows users to remain anonymous on the internet
- 12. 2 Words. A program that helps users and businesses securely store and manage their login credentials.
- 17. 2 Words. Attackers try to gain authentication by cracking the password hash. And they do it by using a list of pre-computed hashes of possible password combinations.
- 18. the attacker systematically enters every word in the dictionary to crack the password
- 21. Decentralized naming system used to associate domain names with other forms of information.
- 23. A form of malware that focuses on replication and distribution.
- 25. 2 Words. your public key can be used to send encrypted messages which other people can decrypt with the key
- 27. From the CIA triad: Record the identities and activities