Across
- 1. a logical element in programming languages that are used for storing a sequence of data elements of the same basic type
- 5. a security mechanism that creates a virtual trap to lure attackers.
- 6. Distributed denial of service (DDoS); involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
- 7. a field of technology that uses investigative techniques to identify and store evidence from a computer device
- 10. A UI redress attack; when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page.
- 12. horse a type of malware that downloads onto a computer disguised as a legitimate program.
- 16. servers that are accessed over the Internet, and the software and databases that run on those servers.
- 18. undocumented way of gaining access to computer system.
- 20. a code that takes advantage of a software vulnerability or security flaw.
- 21. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- 22. any incident that results in unauthorized access to computer data, applications, networks or devices.
- 25. a software program that performs automated, repetitive, pre-defined tasks.
- 26. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
- 28. a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
- 29. penetration testing or ethical hacking; the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications.
Down
- 2. malware that employs encryption to hold a victim's information at ransom.
- 3. the set of instructions, or a system of rules, written in a particular programming language
- 4. a sphere of knowledge identified by a name
- 8. the conversion of data from a readable format into an encoded format
- 9. a computer network security system that restricts internet traffic in, out, or within a private network.
- 11. a series of numbers that identifies any device on a network.
- 13. a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.
- 14. a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- 15. when a person or program records login and password information from a legitimate user to illegally gain access to their account(s)
- 16. also called encryption algorithms, are systems for encrypting and decrypting data.
- 17. a process that transforms encrypted information into its original format.
- 19. the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
- 23. passing some data through a formula that produces a result, called a hash.
- 24. - short for bot network; is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
- 27. instructions that tell a computer what to do.