Cybersecurity unit 6 and 7 vocabulary

1234567891011121314151617181920
Across
  1. 3. The practice of sending users to a fraudulent website to gain control over or gain information from a user.
  2. 7. ISPs that use paid transit for more local transit.
  3. 9. Targeting powerful figures such as CEOs and Celebrities to gain the most valuable information.
  4. 12. A security tool that uses multiple one-time passwords to create a much more secure login.
  5. 15. Use of manipulative techniques to gain information from a target such as passwords.
  6. 16. An IP network that can reach every other network on the internet without paying for a transit.
  7. 18. A secure, centralized building that houses computer infrastructure, such as servers and data storage drives.
  8. 19. The set of rules governing how data is transmitted and addressed on the internet,
  9. 20. The largest network in the world, connecting almost every network and device to each
Down
  1. 1. An internet security tool that masks your IP address and sends it through an encrypted tunnel
  2. 2. The practice of sending fraudulent messages in order to trick victims into revealing information.
  3. 4. The vast majority of the internet, it can only be accessed through authorized access such as a password or a paywall.
  4. 5. Any unauthorized activity that compromises the confidentiality, integrity, and availability of data systems.
  5. 6. The part of the internet that can be freely accessed by everyone.
  6. 8. A network security tool that acts as a digital barrier between a trusted network and an untrustworthy network.
  7. 10. The part of the internet that is intentionally hidden and requires special software to access it.
  8. 11. Process of gathering information on a target without directly interacting with its systems.
  9. 13. A security tool that detects, prevents, and removes malicious software.
  10. 14. The final segment of a network that relies on infrastructure that physically connects an ISP’s network to an end user.
  11. 17. A powerful computer that stores data and manages network resources for a network, delivering it to other “client” computers.