Cyber Fund Final Exam Vocab

123456789101112131415161718192021222324
Across
  1. 3. a computer system on the internet that is expressly set up to attract and trap intruders
  2. 5. the state of being complete or uncorrupted
  3. 6. data can be accessed when needed
  4. 8. spoofed emails and fraudulent websites designed to fool recipients into divulging PII
  5. 12. small text files that are saved on the computer for use with web browsers and websites
  6. 13. another word for "technical" skills
  7. 17. Governs the type of traffic that is and isn't allowed through a firewall
  8. 21. a governmental organization for standardizing measurement, technology, and industrial standards
  9. 22. the physical part of a computer that you can touch
  10. 23. a common type of DoS attack that involves sending more traffic to a network than the temp data storage can hold
  11. 24. the condition of being private or secret
Down
  1. 1. using a lie or scam to obtain private info
  2. 2. the #1 cause of information security breaches for organizations
  3. 4. This software is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
  4. 7. deploys when conditions exist that malware is seeking
  5. 9. the internet protocol that has 128 bits
  6. 10. the Act that ensures that financial businesses are protecting your private data
  7. 11. a tool that intercepts raw data traveling on a network
  8. 14. a malicious website using a URL similar to a real one (ex.: www.aple.com)
  9. 15. malware hidden inside other software that seems harmless
  10. 16. acronym for "Open Source Intelligence" - involves obtaining info that is freely available online using passive, semipassive, or active info gathering methods
  11. 18. a flaw or potential for harm
  12. 19. a program or code that replicates by being copied or initiating its copying to another program
  13. 20. the type of harvest attack that tries to determine the valid email addresses associated with a server so they can be added to spam