Across
- 2. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 3. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- 7. Text that can be read by the human eye, like this article!
- 8. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- 9. The programs and other operating systems used by a computer.
- 12. A cyber attacker who uses software and social engineering methods to steal data and information.
- 13. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- 16. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- 18. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- 19. The deliberate use of someone else's identity, typically for financial gain.
- 20. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- 1. Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- 3. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- 4. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- 5. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- 6. Software that has their code listed as free to use, share, and modify.
- 10. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- 11. A simple form of code for software that can be written in word editors.
- 14. Customizable additions to software for extra functionality.
- 15. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- 17. A secret word or phrase that is used to access a computer system or service.