Cybersecurity
Across
- 5. process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
- 8. when a programmer gains access to a computer or network by bypassing security steps through a trapdoor programs
- 11. a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device
- 12. provides additional- revised or updated code for an operating system or application
- 15. software that is secretly installed on a user’s device to gather sensitive data
- 17. someone who intentionally challenges the security of a computer system- network- or web application to discover vulnerabilities that an attacker or hacker could exploit
- 18. information should be consistently and readily accessible for authorized parties
- 20. attack when one or more compromised systems launch a flooding attack on a remote target(s)- in an attempt to overload network resources and disrupt service.
- 22. a type of internet fraud that seeks to acquire a user’s credentials by deception- usually taking the form of fake notifications from banks- providers- e-pay systems- and other organizations.
- 23. taking advantage of a vulnerability or flaw in a network system to penetrate or attack it.
- 26. the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience.
- 27. the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data
- 29. an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
- 30. maintaining the consistency- accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit- and steps must be taken to ensure data cannot be altered by unauthorized people
Down
- 1. assurance that information is not disclosed to unauthorized persons- processes- or devices.
- 2. an attack method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
- 3. criminals who break into computer networks with malicious intent.
- 4. an increasingly popular method of gaining access to unauthorized resources by exploiting human psychology and manipulating users – rather than by breaking in or using technical hacking techniques
- 6. a facility where enterprise information systems (websites- applications- databases- data centers and servers- networks- desktops- and other endpoints) are monitored- assessed- and defended by SOC analysts.
- 7. look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found- they report them to the owner- sometimes requesting a small fee to fix the problem
- 9. sometimes also called “ethical hackers” or “good hackers” – exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.
- 10. the practice and study of techniques for secure communication in the presence of adversarial behavior.
- 13. the process of verifying the identity of a user or piece of information and the veracity of the information provided. In computing- it is the process of identifying a person or system with a username- password- etc.
- 14. encrypted parts of the internet that are not indexed by search engines- most notoriously used by all types of criminals including; pedophiles- illicit human and contraband traffickers- and cyber criminals- to communicate and share information without being detected or identified by law enforcement.
- 16. a kind of spyware software that records every keystroke made on a computer’s keyboard
- 19. when a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
- 21. a security system that forms a virtual perimeter around a network of workstations preventing viruses- worms- and hackers from penetrating.
- 24. a general term for any type of intrusive computer software with malicious intent against the user.
- 25. a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- 28. a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.