Across
- 4. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- 5. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- 9. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- 11. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- 15. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 16. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- 17. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- 18. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- 19. Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- 20. A simple form of code for software that can be written in word editors.
Down
- 1. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- 2. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- 3. The programs and other operating systems used by a computer.
- 6. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- 7. Text that can be read by the human eye
- 8. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- 10. A cyber attacker who uses software and social engineering methods to steal data and information.
- 12. The way in which the identity of a user is confirmed.
- 13. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- 14. Customizable additions to software for extra functionality.
- 21. A secret word or phrase that is used to access a computer system or service.