Cyber Definitions

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
Across
  1. 1. To crack one system and then use it as a “launching pad” for cracking other systems.
  2. 6. An evaluation of events that can adversely affect operations and/or specific assets.
  3. 7. A form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.
  4. 10. To convert (a message, information, etc.) into cipher.
  5. 11. to confirm information or identity.
  6. 12. The reduction of exposure to potential problems in business.
  7. 14. The science of protecting information by transforming it into a secure format.
  8. 16. The act of disguising a communication from an unknown source as being from a known, trusted source.
  9. 21. Advertising supported software, is software that displays unwanted advertisements on your computer.
  10. 24. (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection.
  11. 28. Someone who creates a false online identity.
  12. 29. Identity Verification means ensuring that identity data is associated with a particular individual, for example matching date of birth and address to an individual's name.
  13. 32. A blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
  14. 34. Intellectual property or source that is not provided to the public.
  15. 36. A software for which the original source code is made freely available and may be redistributed and modified according to the requirement of the user.
  16. 37. A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.
  17. 41. A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
  18. 42. A person who operates the command and control of botnets for remote process execution.
  19. 43. Loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent.
  20. 44. Contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge–response test used in computing to determine whether or not the user is human.
  21. 45. Internet protocol address, it is an identifying number that is associated with a specific computer or computer network.
  22. 46. Occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor.
  23. 49. Converts one value to another.
  24. 51. Classified data is introduced to an unclassified computer system or a system authorized at a lower classification.
  25. 52. An individual who controls and maintains a botnet by installing malicious software in many computers, placing these devices under his/her control.
  26. 55. An individual or organization's cloud account is stolen or hijacked by an attacker.
  27. 56. A group of hackers with varying backgrounds, that would test the assumption of an organization's digital presence and the blue team's threat response activity.
  28. 59. A method or pathway used by a hacker to access or penetrate the target system.
  29. 60. A software application that scans and records passwords that are used or broadcasted on a computer or network interface.
  30. 61. A type of malware that is designed so that they can remain hidden on your computer.
  31. 62. Authenticates all users in a group at once.
  32. 63. Someone who exploits computer systems or networks to identify security flaws and make improvement recommendations.
Down
  1. 2. A manipulation technique that exploits human error to gain private information, access, or valuables.
  2. 3. The process of safeguarding important information from corruption, compromise or loss.
  3. 4. Criminals who break into computer networks with malicious intent.
  4. 5. An attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected.
  5. 8. A form of a security breach that occurs when an individual's or company's data is copied, transferred, or retrieved from a computer or server without authorization.
  6. 9. A process used to determine which components of the system need to be protected and the types of security risks (threats) they should be protected from.
  7. 13. A software application that runs automated tasks (scripts) over the Internet.
  8. 15. A systematic examination of a task, job or process that you carry out at work for the purpose of; Identifying the significant hazards that are present.
  9. 17. A cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered.
  10. 18. A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
  11. 19. A sacrificial computer system that's intended to attract cyberattacks, like a decoy.
  12. 20. Storing information over the internet instead of a computer’s hard drive.
  13. 22. A type of malware that is often disguised as legitimate software.
  14. 23. Is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
  15. 25. all the ways you can be attacked
  16. 26. A security device that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.
  17. 27. Malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  18. 28. A person who breaks into a computer system without authorization, whose purpose is to do damage (destroy files, steal credit card numbers, plant viruses, etc.).
  19. 30. a set of instructions to help IT staff detect, respond to, and recover from network security incidents.
  20. 31. built for the act of keystroke logging, creating records of everything you type on a computer or mobile keyboard.
  21. 33. A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
  22. 35. A type of malicious code or software that looks legitimate but can take control of your computer.
  23. 38. Conversion of data from a readable format into an encoded format that can only be read or processed after it's been decrypted.
  24. 39. A cyber attack that uses disguised email as a weapon.
  25. 40. A type of malware that spreads copies of itself from computer to computer.
  26. 47. A collection of internet-connected devices infected by malware that allow hackers to control them.
  27. 48. A process used to extract usable data from a larger set of any raw data.
  28. 50. list of known unwanted companies or services that should be avoided.
  29. 53. Sign that an attacker may be planning an attack.
  30. 54. Cyberattack on a server, service, website, or network floods it with Internet traffic.
  31. 57. A code that takes advantage of a software vulnerability or security flaw.
  32. 58. saved to a hard drive in a different location, or spare of some sort.