Across
- 4. Customizable additions to software for extra functionality.
- 6. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- 10. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- 12. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- 14. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- 17. The way in which the identity of a user is confirmed.
- 20. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- 21. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- 22. A cyber attacker who uses software and social engineering methods to steal data and information.
- 23. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- 1. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- 2. Text that can be read by the human eye
- 3. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 5. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- 7. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- 8. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- 9. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- 11. A strategy that is in place to manage upgrades for software applications.
- 13. A simple form of code for software that can be written in word editors.
- 15. The programs and other operating systems used by a computer.
- 16. A secret word or phrase that is used to access a computer system or service.
- 18. Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- 19. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.