Across
- 1. To crack one system and then use it as a “launching pad” for cracking other systems.
- 6. An evaluation of events that can adversely affect operations and/or specific assets.
- 7. A form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.
- 10. To convert (a message, information, etc.) into cipher.
- 11. to confirm information or identity.
- 12. The reduction of exposure to potential problems in business.
- 14. The science of protecting information by transforming it into a secure format.
- 16. The act of disguising a communication from an unknown source as being from a known, trusted source.
- 21. Advertising supported software, is software that displays unwanted advertisements on your computer.
- 24. (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection.
- 28. Someone who creates a false online identity.
- 29. Identity Verification means ensuring that identity data is associated with a particular individual, for example matching date of birth and address to an individual's name.
- 32. A blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
- 34. Intellectual property or source that is not provided to the public.
- 36. A software for which the original source code is made freely available and may be redistributed and modified according to the requirement of the user.
- 37. A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.
- 41. A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- 42. A person who operates the command and control of botnets for remote process execution.
- 43. Loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent.
- 44. Contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge–response test used in computing to determine whether or not the user is human.
- 45. Internet protocol address, it is an identifying number that is associated with a specific computer or computer network.
- 46. Occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor.
- 49. Converts one value to another.
- 51. Classified data is introduced to an unclassified computer system or a system authorized at a lower classification.
- 52. An individual who controls and maintains a botnet by installing malicious software in many computers, placing these devices under his/her control.
- 55. An individual or organization's cloud account is stolen or hijacked by an attacker.
- 56. A group of hackers with varying backgrounds, that would test the assumption of an organization's digital presence and the blue team's threat response activity.
- 59. A method or pathway used by a hacker to access or penetrate the target system.
- 60. A software application that scans and records passwords that are used or broadcasted on a computer or network interface.
- 61. A type of malware that is designed so that they can remain hidden on your computer.
- 62. Authenticates all users in a group at once.
- 63. Someone who exploits computer systems or networks to identify security flaws and make improvement recommendations.
Down
- 2. A manipulation technique that exploits human error to gain private information, access, or valuables.
- 3. The process of safeguarding important information from corruption, compromise or loss.
- 4. Criminals who break into computer networks with malicious intent.
- 5. An attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected.
- 8. A form of a security breach that occurs when an individual's or company's data is copied, transferred, or retrieved from a computer or server without authorization.
- 9. A process used to determine which components of the system need to be protected and the types of security risks (threats) they should be protected from.
- 13. A software application that runs automated tasks (scripts) over the Internet.
- 15. A systematic examination of a task, job or process that you carry out at work for the purpose of; Identifying the significant hazards that are present.
- 17. A cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered.
- 18. A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
- 19. A sacrificial computer system that's intended to attract cyberattacks, like a decoy.
- 20. Storing information over the internet instead of a computer’s hard drive.
- 22. A type of malware that is often disguised as legitimate software.
- 23. Is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
- 25. all the ways you can be attacked
- 26. A security device that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.
- 27. Malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- 28. A person who breaks into a computer system without authorization, whose purpose is to do damage (destroy files, steal credit card numbers, plant viruses, etc.).
- 30. a set of instructions to help IT staff detect, respond to, and recover from network security incidents.
- 31. built for the act of keystroke logging, creating records of everything you type on a computer or mobile keyboard.
- 33. A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
- 35. A type of malicious code or software that looks legitimate but can take control of your computer.
- 38. Conversion of data from a readable format into an encoded format that can only be read or processed after it's been decrypted.
- 39. A cyber attack that uses disguised email as a weapon.
- 40. A type of malware that spreads copies of itself from computer to computer.
- 47. A collection of internet-connected devices infected by malware that allow hackers to control them.
- 48. A process used to extract usable data from a larger set of any raw data.
- 50. list of known unwanted companies or services that should be avoided.
- 53. Sign that an attacker may be planning an attack.
- 54. Cyberattack on a server, service, website, or network floods it with Internet traffic.
- 57. A code that takes advantage of a software vulnerability or security flaw.
- 58. saved to a hard drive in a different location, or spare of some sort.
