Cyber Security Words and Terms

1234567891011121314151617
Across
  1. 3. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
  2. 8. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  3. 9. theft The deliberate use of someone else's identity, typically for financial gain.
  4. 10. A simple form of code for software that can be written in word editors.
  5. 11. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  6. 13. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  7. 15. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  8. 17. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
Down
  1. 1. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  2. 2. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  3. 4. source Software that has their code listed as free to use, share, and modify.
  4. 5. text Text that can be read by the human eye, like this article!
  5. 6. private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  6. 7. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
  7. 12. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
  8. 14. breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  9. 16. A cyber attacker who uses software and social engineering methods to steal data and information.