CSE167 Terminology

123456789101112131415161718192021222324252627
Across
  1. 4. 2 Words A technique used to manipulate and deceive people in the real world to gain sensitive and private information.
  2. 6. 2 Words. an act that sought to curb unsolicited commercial emails
  3. 8. a cyber attack used to obtain information like passwords and bank info.
  4. 9. 2 Words. An attack that is done over an online format.
  5. 13. Any weakness in an asset or security protection which would allow for a threat to cause harm.
  6. 14. things that can protect your defense points (methods)
  7. 15. 2 Words. attacker tries to crack the password by submitting various combinations until the correct one is found
  8. 16. A form of cyber attack that floods a service with malicious traffic or data to shut it down
  9. 19. A form of malware that monitors user activities and reports them to an external party.
  10. 20. From the CIA triad: Information kept private and secure
  11. 21. 2 Words. key points which should be identified to protect
  12. 22. A collection of computers with malware that allows a hacker to run software used for illegal purposes.
  13. 24. A copy of the system or networks data for file restoration or archival purposes
  14. 26. Study of secure communication technics in the presence of third parties
Down
  1. 1. a set of programs that tell a computer to perform a task
  2. 2. A malicious application or script that can be used to take advantage of a vulnerability
  3. 3. From the CIA triad: Data not modified (deleted or added)
  4. 5. Possibility of suffering loss. Areas include financial, legal, strategic, and security.
  5. 7. 4 Words A type of attack where an attacker secretly intercepts and possibly alters the communications between two parties.
  6. 10. 3 Words. A game in which keys are intentionally hidden within vulnerable programs or websites.
  7. 11. a tool that allows users to remain anonymous on the internet
  8. 12. 2 Words. A program that helps users and businesses securely store and manage their login credentials.
  9. 17. 2 Words. Attackers try to gain authentication by cracking the password hash. And they do it by using a list of pre-computed hashes of possible password combinations.
  10. 18. the attacker systematically enters every word in the dictionary to crack the password
  11. 21. Decentralized naming system used to associate domain names with other forms of information.
  12. 23. A form of malware that focuses on replication and distribution.
  13. 25. 2 Words. your public key can be used to send encrypted messages which other people can decrypt with the key
  14. 27. From the CIA triad: Record the identities and activities