Newsletter
Across
- 3. What term describes an ethical hacker who uses their skills to improve cybersecurity
- 4. what acts as a barrier between a trusted internal network and an untrusted external network.
- 5. What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
- 6. What term in cybersecurity is responsible for defending against simulated or real attacks.
- 8. What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
- 10. What technology stores recently accessed data to speed up future acess
- 12. What type of malware will self-replication and spread independently across networks.
- 13. What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
- 16. What term refers to the physical components of a computer system.
- 18. What term refers to a group of interconnected computers or other devices that can communicate with each other.
- 21. What term refers to testing a computer system, network, or web application to find security vulnerabilities?
- 22. What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
- 24. what term refers to a collection of data or computer instructions that tell a computer how to work.
- 25. What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
- 27. What group within an organization is responsible for simulating attacks against their own organization to test security measures.
- 28. What term refers to a fixed-size output of a hash function that represents input data?
Down
- 1. What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
- 2. What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
- 6. What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
- 7. What term refers to when someone is trying to disguise themselves as being a trusted known source.
- 9. What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
- 11. What type of software attaches itself to a legitimate program and spreads once the program is run.
- 14. What term describes unauthorized use of someone else's computer to mine cryptocurrency?
- 15. What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
- 17. What type of malware encrypts a victim’s files and demands payment for the decryption key?
- 19. What field of study involves techniques for secure communication in the presence of third parties?
- 20. What protocol translates domain names into IP addresses?
- 23. What term refers to a record of events that happen within an operating system, application or network device.
- 26. What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.