Across
- 6. A cyber attack where a hacker alters DNS records to redirect users to a fraudulent website.
- 9. small portions of data used to remember user preferences on websites.
- 12. A security tool where a password requires multiple different applications all using one time codes to log in.
- 14. Standard programming language for communicating with networks.
- 15. A security tool to distinguish between humans and bots.
- 17. A precise step by step set of instructions or rules to achieve a task or solve a problem.
- 18. A one way algorithm that converts data of any size into a fixed-length string of characters, used in cryptography.
- 19. A cyberattack where an intruder places themselves in between networks to intercept whatever travels through the network.
- 20. A cyberattack where criminals use bots to test stolen username and password pairs on different websites to gain unauthorized access.
Down
- 1. A cybersecurity attack where hackers use a list of words and phrases to guess passwords.
- 2. A deliberate, unauthorized action to exploit flaws in a network in order to steal or modify data.
- 3. Security tool that uses unique traits of a user’s body to grant authentication such as fingerprints or retina.
- 4. A technique where a hacker sends data with a falsified source IP to bypass security measures such as firewalls.
- 5. A cybersecurity attack where hackers use automated programs to guess every possible combination of characters to guess passwords.
- 7. An attempt to exploit vulnerabilities in applications, code, or operating systems to steal data or gain unauthorized access.
- 8. A character set comprising both letters and numbers.
- 10. A command written in SQL used to communicate with and manipulate data in a database.
- 11. A secure, temporary, alphanumerical code used for authentication that only works one time.
- 13. A malicious SQL code injected into a database to allow attackers to view or modify data in a database without authorization.
- 16. A standardized, structured collection of data.
