Cyber Terms

12345678910111213141516171819202122232425
Across
  1. 4. Changing your Ip or Mac address to appear from a different machine
  2. 5. (2wds) A misleading compyer program that allows a heacker into your system
  3. 7. Malware which changes, corrupts, or destroys information, and is then passed on to other systems
  4. 11. computers and peripherals connected as on entity
  5. 12. servers that are accessed over the Internet, and the software and databases that run on those servers
  6. 16. (2wds) Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft.
  7. 19. Process of Identifying a user's identity
  8. 21. Coding used to protect your infroomation from hackers
  9. 23. Malware that snoops on you
  10. 24. Software or Hardware used to keep intruders out
  11. 25. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
Down
  1. 1. An approach to security evaluation where manual exploitations and automated techniques are used by attack and security professionals.
  2. 2. (2wds) techniques aimed at talking target into revealing information or performing an action for illegitimate reasons
  3. 3. someone is tricked into clicking on one object on a web page when they want to click on another
  4. 6. a gorup of instructions or applications that instruct a computer to carry out a task
  5. 8. a wide variety of bad software used to infect and/or damage a system
  6. 9. (2wds) A hacker who is invited to test out computer systems and servers, looking for vulnerabilities
  7. 10. a collection of programs or software tools that allow hackers to remotely access and control a computer
  8. 13. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  9. 14. (2Wds) Source of leaked information
  10. 15. Sending fake emails to get you to click on a link
  11. 16. network of infected computers working together to create security breaches
  12. 17. A means of attack on a computer system
  13. 18. malware that encrypts your files until you pay a fee
  14. 20. Two or more computers connected together to share resources
  15. 22. (2Wds) Any attempt to breach a electronic systems security boundary