Cybersecurity Unit 3 Terminology

12345678910111213141516171819202122232425262728
Across
  1. 3. A base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.
  2. 6. Wired Equivalent Privacy is a security algorithm used in wireless networks.
  3. 7. The Maximum Transmission Unit is the maximum amount of bytes than can be packaged into frame data.
  4. 9. A wireless access point is a device provides connectivity to a network.
  5. 10. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
  6. 14. A media access control addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.
  7. 16. The selective process of allowing or restricting the availability of a resource.
  8. 18. The fourth and last phase of ethical hacking in which the security professionals fix the system vulnerabilities uncovered in the previous phases.
  9. 19. The act of starting or launching a process. The new processes is a child process of a parent process..
  10. 22. The operation of joining character strings end-to-end.
  11. 23. A device that plots a graph of signal strength (vertical axis) versus frequency (horizontal axis).
  12. 25. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
  13. 27. The first phase of ethical hacking, which involves probing of the network to understand its structure and to see what services are open and running.
  14. 28. A collection of files on a computer, logically grouped together.
Down
  1. 1. A program that allows a user to enter commands to interact with an operating system.
  2. 2. An exchange of messages that prove the identity of users and computers in a system.
  3. 4. The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.
  4. 5. It can have two meanings in computer terminology: it can be a specific application or function such as email, chat, etc. or it can refer to a specific part of an application, such as transmitting the data of a webpage
  5. 8. Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.
  6. 11. A very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
  7. 12. The second phase of ethical hacking, which involves taking a closer look at the services and software running on the hosts.
  8. 13. A starting point for data analysis. It is the initial data set used in later comparisons.
  9. 15. An input value to a command.
  10. 17. Software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.
  11. 20. A method of transferring and organizing data over a network using packets, which contain routing information along with the data.
  12. 21. A process in UNIX that runs without user input.
  13. 24. An attack where a malicious user changes and corrupts the MAC-IP address information on a target computer.
  14. 26. A network communication protocol occurring in the data link layer 2 and physical layer 1 of the OSI model.