Across
- 2. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- 5. The programs and other operating systems used by a computer.
- 9. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- 10. Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- 11. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- 12. A cyber attacker who uses software and social engineering methods to steal data and information.
- 13. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- 14. A secret word or phrase that is used to access a computer system or service.
- 15. A strategy that is in place to manage upgrades for software applications.
- 16. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- 17. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- 19. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
Down
- 1. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- 2. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- 3. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- 4. The way in which the identity of a user is confirmed.
- 6. Customizable additions to software for extra functionality.
- 7. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 8. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- 9. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- 15. Text that can be read by the human eye
- 18. A simple form of code for software that can be written in word editors.