Cybersecurity Final Vocab

1234567891011121314151617181920212223242526272829
Across
  1. 1. a logical element in programming languages that are used for storing a sequence of data elements of the same basic type
  2. 5. a security mechanism that creates a virtual trap to lure attackers.
  3. 6. Distributed denial of service (DDoS); involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
  4. 7. a field of technology that uses investigative techniques to identify and store evidence from a computer device
  5. 10. A UI redress attack; when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page.
  6. 12. horse a type of malware that downloads onto a computer disguised as a legitimate program.
  7. 16. servers that are accessed over the Internet, and the software and databases that run on those servers.
  8. 18. undocumented way of gaining access to computer system.
  9. 20. a code that takes advantage of a software vulnerability or security flaw.
  10. 21. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  11. 22. any incident that results in unauthorized access to computer data, applications, networks or devices.
  12. 25. a software program that performs automated, repetitive, pre-defined tasks.
  13. 26. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
  14. 28. a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
  15. 29. penetration testing or ethical hacking; the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications.
Down
  1. 2. malware that employs encryption to hold a victim's information at ransom.
  2. 3. the set of instructions, or a system of rules, written in a particular programming language
  3. 4. a sphere of knowledge identified by a name
  4. 8. the conversion of data from a readable format into an encoded format
  5. 9. a computer network security system that restricts internet traffic in, out, or within a private network.
  6. 11. a series of numbers that identifies any device on a network.
  7. 13. a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.
  8. 14. a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  9. 15. when a person or program records login and password information from a legitimate user to illegally gain access to their account(s)
  10. 16. also called encryption algorithms, are systems for encrypting and decrypting data.
  11. 17. a process that transforms encrypted information into its original format.
  12. 19. the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
  13. 23. passing some data through a formula that produces a result, called a hash.
  14. 24. - short for bot network; is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
  15. 27. instructions that tell a computer what to do.