Cyber Security Words and Terms

12345678910111213141516171819
Across
  1. 2. A secret word or phrase that is used to access a computer system or service.
  2. 3. Text that can be read by the human eye, like this article!
  3. 5. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  4. 6. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  5. 7. A simple form of code for software that can be written in word editors.
  6. 9. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  7. 10. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
  8. 12. The deliberate use of someone else's identity, typically for financial gain.
  9. 13. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  10. 14. A cyber attacker who uses software and social engineering methods to steal data and information.
  11. 15. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  12. 18. Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  13. 19. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
  1. 1. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  2. 3. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  3. 4. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  4. 8. The programs and other operating systems used by a computer.
  5. 11. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  6. 16. Software that has their code listed as free to use, share, and modify.
  7. 17. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.