Across
- 2. A way to access an electronic system by bypassing some or all security mechanisms.
- 4. A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- 6. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- 8. A politically- or ideologically-motivated cyber attack or hack.
- 11. the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
- 12. A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- 14. or operating in transnational several nations
- 16. A website that finds information across the Internet based on a set of search criteria.
- 19. an assault on electronic communication networks
- 21. An information packet sent from a website to a web browser that records a user’s activity on that website.
- 28. This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
- 33. Unsolicited advertising or other information sent out via email or other messaging service.
- 34. A program that masks something harmful, such as a worm or virus, that it carries into a device.
- 35. A company that offers access to the Internet.
- 37. someone who attempts to prevent terrorism or intended to prevent terrorism
- 38. A username and password used to identify an individual attempting to gain access to a restricted page or network.
- 39. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- 40. define as “malicious software” specifically designed to gain access to or damage a computer
- 44. These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
- 46. Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
- 47. A software robot that performs automated tasks.
- 48. A camera connected to a computer, generally used to then stream videos to the Internet.
- 49. hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
- 50. A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
Down
- 1. An online journal. Contraction of the term “web log.”
- 3. crime that involves a computer and a network.
- 5. These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
- 6. They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
- 7. hacker objective is to find black hat hackers, intercept and destroy their schemes.
- 9. an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
- 10. sexual arousal involving communication on the internet
- 13. The act of one individual harassing or intimidating another individual via the Internet.
- 15. A massed data that is used to describe large amounts of other Internet data.
- 17. someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
- 18. the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
- 20. when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
- 22. administrator An individual who manages and oversees a network.
- 23. A satellite navigation system that identifies the precise location of the transmitting device.
- 24. it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
- 25. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- 26. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- 27. These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
- 29. Malicious software, such as a virus or a worm, that attacks a target computer.
- 30. A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
- 31. (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
- 32. The overarching program that runs all the functions on a computer or other electronic device.
- 36. other terms for cybercrime
- 41. The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- 42. the activity of converting data or information into code
- 43. A group of computers that is linked to share data and other information.
- 45. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
