Lesson 1.1.1
Across
- 4. A set of rules and guidelines that outline the acceptable behaviors and responsibilities for users in a specific environment, often in workplaces or online platforms.
- 7. Script A file containing Python code that can be executed to perform a series of tasks or automate processes.
- 11. An individual or group that carries out phishing attacks by sending deceptive emails or messages to steal personal information.
- 12. A software-based emulation of a computer that runs programs and applications just like a physical computer, but in a controlled, isolated environment.
- 16. Online platforms that enable users to create, share content, and interact with others (e.g., Facebook, Twitter, Instagram).
- 18. The last segment of a domain name, such as .com, .org, or .edu, used to classify domain names into categories based on purpose or geographical location.
- 19. A task automation and configuration management framework from Microsoft, consisting of a command-line shell and scripting language built on the .NET framework.
- 21. A command used in operating systems to change the current directory in the command-line interface.
- 22. A type of challenge-response test used to determine whether the user is human and to prevent bots from accessing websites or services.
- 23. Lifecycle The continuous process of protecting systems, networks, and data through identifying risks, implementing protective measures, detecting incidents, responding to threats, and recovering from attacks.
Down
- 1. The process of converting data into a code to protect it from unauthorized access, requiring a decryption key to read the information.
- 2. A step-by-step procedure or formula for solving a problem, often used in computing and data processing.
- 3. Attack A type of attack where a hacker tries a list of commonly used passwords or words from a dictionary to gain access to a system.
- 5. Footprint The trail of data you leave behind when you use the internet, including websites you visit, emails you send, and social media activity.
- 6. Unsolicited and irrelevant messages sent over the internet, typically in bulk, usually for advertising purposes.
- 8. A fraudulent attempt to obtain sensitive information such as passwords and credit card details by posing as a trustworthy entity via email or other online communication.
- 9. Extension The suffix at the end of a filename that indicates what type of file it is (e.g., .txt for text files, .doc for Word documents).
- 10. The process of giving someone permission to access resources or perform certain actions on a system.
- 13. a Password The process of using various techniques, such as brute force or dictionary attacks, to guess or break the password protecting a system or account.
- 14. Source The origin of an email, which includes information such as the sender's IP address and server details, often found in the email header.
- 15. A command in Windows that displays a list of files and directories in the current directory.
- 17. A method used to crack passwords by trying every possible combination of characters until the correct one is found.
- 20. The process of verifying the identity of a user, device, or system to ensure they are who they claim to be.