Cybersecurity Unit 6 and 7 Vocab

123456789101112131415161718
Across
  1. 1. a network security system—available as hardware, software, or cloud service—that acts as a barrier between trusted internal networks and untrusted external networks
  2. 3. a comprehensive strategy combining physical security (guards, surveillance, locks) and IT security (firewalls, encryption, access controls) to protect the infrastructure, servers, and sensitive data within a facility
  3. 6. a concealed, non-indexed layer of the internet requiring specialized software (e.g., Tor) for access, prioritizing user anonymity
  4. 11. sending fraudulent emails to CEOs or executives in an attempt to steal information from the target for malicious purposes
  5. 12. standardized sets of rules, techniques, and procedures designed to protect data integrity, confidentiality, and availability during transmission over networks
  6. 14. the backbone of the internet, owning global, high-capacity infrastructure (fiber, routers) and refocuses on securing infrastructure with increasing complexity, redundancy, and risk, often following NIST CSF guidelines every other network via settlement-free peering
  7. 15. any unauthorized, malicious action targeting a computer system, network, or data to compromise its confidentiality, integrity, or availability
  8. 18. Social engineering is the psychological manipulation of people into performing actions or divulging confidential information, bypassing technical security controls. It exploits human emotions—fear, urgency, curiosity, or trust
Down
  1. 2. a critical cybersecurity tool designed to detect, block, and remove malicious software (malware)—such as viruses, ransomware, spyware, and worms—from devices and networks
  2. 4. a powerful, networked computer or software program that manages, stores, and processes data while providing services (e.g., website hosting, file storage, email) to client devices
  3. 5. the practice of protecting internet-connected systems—including hardware, software, and data—from malicious digital attacks, unauthorized access, or damage
  4. 7. sending fraudulent emails in an attempt to steal information from the target for malicious purposes
  5. 8. cybersecurity tool that creates an encrypted, secure "tunnel" over a public network (like the internet) to protect user privacy and data
  6. 9. the stealthy, initial phase of gathering information about a target system, network, or organization without direct engagement or interaction
  7. 10. all internet content not indexed by standard search engines (like Google) and is not inherently malicious, often consisting of legitimate, private, password-protected, or encrypted data
  8. 13. redirecting people from popular websites to fraudulent websites in an attempt to steal information for malicious purposes
  9. 16. the final, often most challenging, step of securing data as it reaches the end user, device, or application
  10. 17. The surface web is the publicly accessible, indexed portion of the internet searchable via standard browsers (Google, Bing). Representing only 4–5% of total online content, it includes websites, social media, and news