Cybersecurity Unit 2 Terminology

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 3. The way an organization structures and organizes the information that is required by their employees and/or customers.
  2. 5. Performing a computer attack to evaluate the security of a system.
  3. 8. A computer typically one on a network.
  4. 11. An agreed-upon method for communication.
  5. 13. A file that contains an official record of activities that occur on a computer.
  6. 15. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
  7. 16. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
  8. 17. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden allowing the user to focus on the details that are important for the task at hand.
  9. 18. A way for a computer to identify specific programs and manage their activity.
  10. 20. Preserving the accuracy of information and validating its source.
  11. 22. A network device that controls and filters data between networks either wired or wireless. It is a specific type of "gateway" a device that acts as a gate between two networks.
  12. 23. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
  13. 25. Transmission Control Protocol used to establish and maintain connections over a computer network.
  14. 27. Refers to the action of watching and analyzing network traffic at the packet level.
  15. 30. An identifying number for hosts and servers on the internet.
  16. 31. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
  17. 32. It can have two meanings in computer terminology: a) it can be a specific application or function such as email chat etc. b) it can refer to a specific part of an application such as transmitting the data of a web page
  18. 34. Keeping sensitive information out of unwanted hands.
  19. 35. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data take control of a computer run malicious code or achieve a phishing scam.
  20. 37. In a command flags are used to specify different variations sometimes supplying additional input to the command or requesting different styles of output from the command.
  21. 38. Often referred to as hex it is a base-16 number system.
  22. 39. Problems faults and bugs in the program that are exploitable allowing attackers access to the computer on which the program is running.
  23. 41. A database in which data is organized into collections of similar data called tables. It uses relationships to define how data in one table can relate to data in another table.
  24. 45. In network security it allows or denies packets based on source and destinations addresses ports or protocols.
  25. 46. baseline A starting point for data analysis. It is the initial data set used in later comparisons.
  26. 47. Ensuring that information resources and services are accessible in a timely manner.
  27. 48. Analyze something without interfering or affecting it.
Down
  1. 1. The arrangement of the various elements (computers routers switches etc) of a network.
  2. 2. Small units of data transmitted on a network. Collected together they compose some larger data such as a document a website a movie etc.
  3. 4. Software that locks your computer or makes it inoperable requiring you to pay someone to remove it.
  4. 6. Software that replicates and infects many computers turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
  5. 7. The hardware and software used to help organize and analyze data.
  6. 9. A code that defines every structure on an HTML page such as text images and links.
  7. 10. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
  8. 12. Data that is stored in a router in table format. It contains addresses of known networks (other routers) ones that have already been discovered and used.
  9. 14. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
  10. 19. A Wireshark data capture file that contains packet information of network traffic.
  11. 21. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
  12. 24. In terms of computer science it means to increase a systems security and reduce its vulnerabilities.
  13. 26. A machine that requests a webpage using a web browser.
  14. 28. A machine that responds to a request received.
  15. 29. A computer that delivers files forming web pages across a network to requesting clients.
  16. 33. The buying and selling of goods or services over the internet.
  17. 36. A note in a program that describes what the code is doing.
  18. 38. A computer typically one on a network.
  19. 40. Software and hardware that track all keyboard clicks including back spaces to discover usernames passwords credit card numbers and other sensitive information.
  20. 42. A three-way communication method using SYN (synchronize) SYN-ACK (synchronize=acknowledge) and ACK (acknowledge) to establishing a connection between hosts.
  21. 43. A small local area network of computers and devices.
  22. 44. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.