Cybersecurity Terms

1234567891011121314151617181920
Across
  1. 3. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  2. 6. Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
  3. 7. The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  4. 11. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. 12. You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
  6. 13. A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
  7. 14. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. 15. is a method of connecting a series of computers and devices in a private encrypted network
  9. 17. Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
  10. 18. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
  11. 20. Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
  1. 1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. 2. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
  3. 4. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  4. 5. is used to protect your information from hackers.
  5. 8. is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
  6. 9. A form of malware used by hackers to spy on you and your computer activities
  7. 10. also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
  8. 16. Any technology, be it software or hardware, used to keep intruders out.
  9. 19. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network