Cyber Fund Cookies, IoT, & V&T Vocab (Holloway)

1234567891011121314151617181920
Across
  1. 1. Secret or unknown access point into a system
  2. 3. Computing embedded into everyday objects and environments
  3. 7. Malware hidden inside other software that appears to be harmless
  4. 10. Computer code intentionally written to cause some form of harm
  5. 11. Changes its characteristics in attempts to avoid detection from antivirus programs
  6. 12. When a malicious actor gets possession of a user's active Session ID and impersonates the user in a connection to the website
  7. 17. Technology that tracks a user's keystrokes on the keyboard
  8. 18. Actions of the malicious code
  9. 19. Internet of Things; revolves around incorporating computing technology into atypical devices to allow communication with other devices and the Internet
  10. 20. Form of malware that allows the hacker to use an embedded backdoor to gain administrative control of the victim's computer
Down
  1. 2. Malware that encrypts the user's data
  2. 4. Flaw or potential for harm
  3. 5. Small text files saved on the computer for web browsers and websites
  4. 6. Unique code assigned to the user's connection for a period of time to keep track of the website state and associate that state with a user
  5. 8. Does not steal or destroy data, encrypts data so user cannot access it until a fee is paid to the hacker
  6. 9. Mobile Device Management; used to enforce encryption, strong authentication, and monitor device activity centrally
  7. 13. Something that takes a vulnerability to a level where it can be exploited
  8. 14. Bring Your Own Device; policies allow employees and students to use personal devices on organizational networks
  9. 15. Virus that infects a computer before the operating system loads
  10. 16. Software installed on a computer that collects data on the user and then redirects advertising sites to the web browser