Cyber Crossword

12345678910111213141516171819202122
Across
  1. 3. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
  2. 7. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  3. 8. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
  4. 10. Customizable additions to software for extra functionality.
  5. 12. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
  6. 15. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
  7. 18. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  8. 19. Text that can be read by the human eye
  9. 21. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  10. 22. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
  1. 1. The programs and other operating systems used by a computer.
  2. 2. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  3. 3. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  4. 4. Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
  5. 5. A cyber attacker who uses software and social engineering methods to steal data and information.
  6. 6. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
  7. 9. The way in which the identity of a user is confirmed.
  8. 11. A simple form of code for software that can be written in word editors.
  9. 13. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  10. 14. A strategy that is in place to manage upgrades for software applications.
  11. 16. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  12. 17. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  13. 20. A secret word or phrase that is used to access a computer system or service.