Cyber Security Words and Terms

1234567891011121314151617181920
Across
  1. 2. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  2. 3. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  3. 7. Text that can be read by the human eye, like this article!
  4. 8. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  5. 9. The programs and other operating systems used by a computer.
  6. 12. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. 13. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  8. 16. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  9. 18. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  10. 19. The deliberate use of someone else's identity, typically for financial gain.
  11. 20. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
  1. 1. Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  2. 3. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  3. 4. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
  4. 5. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  5. 6. Software that has their code listed as free to use, share, and modify.
  6. 10. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
  7. 11. A simple form of code for software that can be written in word editors.
  8. 14. Customizable additions to software for extra functionality.
  9. 15. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  10. 17. A secret word or phrase that is used to access a computer system or service.