Across
- 2. A secret word or phrase that is used to access a computer system or service.
- 3. Text that can be read by the human eye, like this article!
- 5. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- 6. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- 7. A simple form of code for software that can be written in word editors.
- 9. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- 10. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- 12. The deliberate use of someone else's identity, typically for financial gain.
- 13. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- 14. A cyber attacker who uses software and social engineering methods to steal data and information.
- 15. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- 18. Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- 19. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- 1. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- 3. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- 4. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- 8. The programs and other operating systems used by a computer.
- 11. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 16. Software that has their code listed as free to use, share, and modify.
- 17. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.