Network and Security
Across
- 2. A secret word or phrase that is used to access a computer system or service.
- 4. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- 5. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- 8. Code that is embedded into the hardware of a computer.
- 9. The programs and other operating systems used by a computer.
- 10. A cyber attacker who uses software and social engineering methods to steal data and information.
- 11. programs that automatically execute tasks as ordered by creator
- 12. form of cryptocurrency
- 13. Stands for the National Security Agency
- 14. The method of obtaining user information through fraudulent communications targeted directly at people.
- 17. two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- 1. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
- 2. Text that can be read by the human eye
- 3. creating a fake identity on social network account
- 6. A weakness in a computer system or network that can be exploited by attackers.
- 7. any action that makes a computer system vulnerable
- 9. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- 15. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
- 16. Customizable additions to software for extra functionality
- 18. an error, flaw, failure, or fault