Across
- 3. The way an organization structures and organizes the information that is required by their employees and/or customers.
- 5. Performing a computer attack to evaluate the security of a system.
- 8. A computer typically one on a network.
- 11. An agreed-upon method for communication.
- 13. A file that contains an official record of activities that occur on a computer.
- 15. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
- 16. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
- 17. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden allowing the user to focus on the details that are important for the task at hand.
- 18. A way for a computer to identify specific programs and manage their activity.
- 20. Preserving the accuracy of information and validating its source.
- 22. A network device that controls and filters data between networks either wired or wireless. It is a specific type of "gateway" a device that acts as a gate between two networks.
- 23. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
- 25. Transmission Control Protocol used to establish and maintain connections over a computer network.
- 27. Refers to the action of watching and analyzing network traffic at the packet level.
- 30. An identifying number for hosts and servers on the internet.
- 31. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
- 32. It can have two meanings in computer terminology: a) it can be a specific application or function such as email chat etc. b) it can refer to a specific part of an application such as transmitting the data of a web page
- 34. Keeping sensitive information out of unwanted hands.
- 35. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data take control of a computer run malicious code or achieve a phishing scam.
- 37. In a command flags are used to specify different variations sometimes supplying additional input to the command or requesting different styles of output from the command.
- 38. Often referred to as hex it is a base-16 number system.
- 39. Problems faults and bugs in the program that are exploitable allowing attackers access to the computer on which the program is running.
- 41. A database in which data is organized into collections of similar data called tables. It uses relationships to define how data in one table can relate to data in another table.
- 45. In network security it allows or denies packets based on source and destinations addresses ports or protocols.
- 46. baseline A starting point for data analysis. It is the initial data set used in later comparisons.
- 47. Ensuring that information resources and services are accessible in a timely manner.
- 48. Analyze something without interfering or affecting it.
Down
- 1. The arrangement of the various elements (computers routers switches etc) of a network.
- 2. Small units of data transmitted on a network. Collected together they compose some larger data such as a document a website a movie etc.
- 4. Software that locks your computer or makes it inoperable requiring you to pay someone to remove it.
- 6. Software that replicates and infects many computers turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
- 7. The hardware and software used to help organize and analyze data.
- 9. A code that defines every structure on an HTML page such as text images and links.
- 10. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
- 12. Data that is stored in a router in table format. It contains addresses of known networks (other routers) ones that have already been discovered and used.
- 14. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
- 19. A Wireshark data capture file that contains packet information of network traffic.
- 21. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
- 24. In terms of computer science it means to increase a systems security and reduce its vulnerabilities.
- 26. A machine that requests a webpage using a web browser.
- 28. A machine that responds to a request received.
- 29. A computer that delivers files forming web pages across a network to requesting clients.
- 33. The buying and selling of goods or services over the internet.
- 36. A note in a program that describes what the code is doing.
- 38. A computer typically one on a network.
- 40. Software and hardware that track all keyboard clicks including back spaces to discover usernames passwords credit card numbers and other sensitive information.
- 42. A three-way communication method using SYN (synchronize) SYN-ACK (synchronize=acknowledge) and ACK (acknowledge) to establishing a connection between hosts.
- 43. A small local area network of computers and devices.
- 44. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.