Across
- 3. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
- 8. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 9. theft The deliberate use of someone else's identity, typically for financial gain.
- 10. A simple form of code for software that can be written in word editors.
- 11. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- 13. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- 15. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- 17. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
Down
- 1. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- 2. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- 4. source Software that has their code listed as free to use, share, and modify.
- 5. text Text that can be read by the human eye, like this article!
- 6. private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- 7. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- 12. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- 14. breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- 16. A cyber attacker who uses software and social engineering methods to steal data and information.
