Cyber security

123456789101112131415161718
Across
  1. 4. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
  2. 8. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  3. 9. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
  4. 10. One of the most insidious types of malware, as they are extremely stealthy and difficult to detect by traditional endpoint protection methods. This malware masks its existence and controls the operating system, preventing its detection even further. Hackers use rootkits to access a system and steal information.
  5. 13. Software that can only be run for a limited amount of time before it expires.
  6. 14. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  7. 15. A secret word or phrase that is used to access a computer system or service.
  8. 16. Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
  9. 17. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  10. 18. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
  1. 1. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  2. 2. Code that is embedded into the hardware of a computer.
  3. 3. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  4. 5. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
  5. 6. The core of a computer’s operating system that houses the most essential functions of the computer.
  6. 7. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. 11. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  8. 12. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  9. 14. Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.