Per. 2 Cyber Security Words and Terms Puzzle Maker
Across
- 3. A cyber attacker who uses software and social engineering methods to steal data and information.
- 5. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 6. The method of obtaining user information through fraudulent communications targeted directly at people
- 7. A test that distinguishes between robots and humans using a website.
- 9. typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, can corrupt data or expand throughout a network and damage systems across a company.
- 11. Program that automatically execute tasks as ordered by the creator of the program.
- 14. A language used to create and control the content on a website.
- 16. official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- 17. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
- 18. The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- 19. A simple form of code for software that can be written in word editors.
- 20. An error, flaw, failure, or fault in a computer program or system.
Down
- 1. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- 2. seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- 4. Software that can only be run for a limited amount of time before it expires.
- 6. A secret word or phrase that is used to access a computer system or service.
- 8. Text that can be read by the human eye, like google results for how to make eggs.
- 10. The programs and other operating systems used by a computer.
- 11. An alternative way to access software or hardware.
- 12. A form of malicious software that disguises itself as a harmless computer program.
- 13. An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
- 15. Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.