Unit 8 & 9 vocab
Across
- 1. Using body features like fingerprints to verify identity.
- 3. A language used to manage databases.
- 7. A test to prove you’re a human, not a bot.
- 11. Scrambled versions of passwords stored for security instead of the real password.
- 12. Using stolen usernames/passwords from one site to try logging into sites.
- 14. Any attack that targets a network system (internet systems).
- 15. A system that stores and organizes data.
- 16. A step-by-step process or set of rules used to solve a problem.
- 18. Attacks that target apps or programs to exploit weaknesses
- 19. Faking an IP address to pretend to be someone else.
- 20. Trying every possible password combination until one works.
Down
- 2. A hack where attackers insert malicious code into a database query.
- 4. Redirecting the users to fake websites by changing domain info.
- 5. Logging in using more than one method like password + Code.
- 6. Trying common words from a dictionary to guess passwords.
- 8. A mix of letters and numbers.
- 9. A command used to get or change data in a database.
- 10. Small files stored on your device that remembers website info like logins.
- 13. When someone secretly intercepts communication between two people.
- 17. A code that works only once and expires quickly.