Cybersecurity Vocabulary
Across
- 2. Attack involving the lack of or reduction of a computer resource
- 4. Information about a person that can be used to leverage access
- 6. Side of CIA Triad that involves Trust
- 8. Software installed on a person's computer to record that person's keystrokes and mouse clicks
- 10. Social Engineering attack involving scam messages sent via text message
- 12. Side of CIA Triad involving redundancy and reliability
- 15. Passively gathers information about a potential victim for future use in an attack
Down
- 1. Attack performed using phone calls to coerce victims to reveal personal information
- 3. Side of CIA Triad that involves Passwords
- 5. Social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system
- 7. Social Engineering example that involves fake e-mails attempting to steal PII
- 9. Attack that takes advantage of people who use short, common words or combinations of these words as their passwords
- 11. Eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- 13. Where an attacker tries to use every possible combination of letters and numbers until the find a password.
- 14. Network attack involving a "botnet" that aims to reduce resources or access