Cybersecurity Terms

1234567891011121314151617181920212223242526272829303132
Across
  1. 3. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  2. 5. An attack in which someone sends unsolicited messages to a Bluetooth-enabled device
  3. 6. gap, To physically separate or isolate a system from other systems or networks (2 words)
  4. 12. A computer connected to the Internet that has been compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
  5. 13. A technique allowing to locate a web user based on their IP address
  6. 14. Attackers searching for wireless networks with vulnerabilities while moving around an area in a moving vehicle
  7. 18. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  8. 19. Software that compromises the operation of a system by performing an unauthorized function or process.
  9. 20. Engineering, The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes (2 words)
  10. 23. loss prevention, A set of procedures and mechanisms to stop sensitive data from leaving a security boundary (3 words)
  11. 25. Refers to anything that has the potential to cause serious harm to a computer system
  12. 28. a technique that is aimed to distract hackers with a fake target (a computer or data) and make them pursue it instead of the real one. It helps to secure a high-value target and observe hackers’ main techniques to learn from them
  13. 29. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data.
  14. 30. Refers to everything in a web application that is displayed or takes place on the client (end user device)
  15. 31. king the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  16. 32. Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
Down
  1. 1. The process of verifying the identity or other attributes of an entity (user, process, or device).
  2. 2. response, The activities that address the short-term, direct effects of an incident and may also support short-term recovery.
  3. 4. A malware designed to deny a user or organization access to files on their computer, without first paying a fee.
  4. 7. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
  5. 8. , A network security system that filters unsanctioned incoming and outgoing traffic.
  6. 9. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  7. 10. A type of malware that conceals its true content to fool a user into thinking it's a harmless file
  8. 11. A technique for identifying and dropping packets that have a false source address.
  9. 15. A technique to breach the security of a network or information system in violation of security policy.
  10. 16. A notification that a specific attack has been detected or directed at an organization’s information system
  11. 17. Refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (
  12. 21. An unauthorized user who attempts to or gains access to an information system.
  13. 22. the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
  14. 24. A tool that record what a person types on a device
  15. 26. The process of transforming plaintext into ciphertext.
  16. 27. a cybercrime in which the attacker floods a target with internet traffic to prevent users from accessing connected online services and sites (Acronym)