Cyber Security Words and Terms

12345678910111213141516
Across
  1. 1. A simple form of code for software that can be written in word editors.
  2. 3. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  3. 7. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  4. 11. breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  5. 12. private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  6. 13. theft The deliberate use of someone else's identity, typically for financial gain.
  7. 14. source Software that has their code listed as free to use, share, and modify.
  8. 16. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
  1. 1. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  2. 2. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  3. 4. A cyber attacker who uses software and social engineering methods to steal data and information.
  4. 5. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
  5. 6. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  6. 8. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  7. 9. text Text that can be read by the human eye, like this article!
  8. 10. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  9. 15. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.