Cybersecurity unit 8 and 9 vocabulary

1234567891011121314151617181920
Across
  1. 6. A cyber attack where a hacker alters DNS records to redirect users to a fraudulent website.
  2. 9. small portions of data used to remember user preferences on websites.
  3. 12. A security tool where a password requires multiple different applications all using one time codes to log in.
  4. 14. Standard programming language for communicating with networks.
  5. 15. A security tool to distinguish between humans and bots.
  6. 17. A precise step by step set of instructions or rules to achieve a task or solve a problem.
  7. 18. A one way algorithm that converts data of any size into a fixed-length string of characters, used in cryptography.
  8. 19. A cyberattack where an intruder places themselves in between networks to intercept whatever travels through the network.
  9. 20. A cyberattack where criminals use bots to test stolen username and password pairs on different websites to gain unauthorized access.
Down
  1. 1. A cybersecurity attack where hackers use a list of words and phrases to guess passwords.
  2. 2. A deliberate, unauthorized action to exploit flaws in a network in order to steal or modify data.
  3. 3. Security tool that uses unique traits of a user’s body to grant authentication such as fingerprints or retina.
  4. 4. A technique where a hacker sends data with a falsified source IP to bypass security measures such as firewalls.
  5. 5. A cybersecurity attack where hackers use automated programs to guess every possible combination of characters to guess passwords.
  6. 7. An attempt to exploit vulnerabilities in applications, code, or operating systems to steal data or gain unauthorized access.
  7. 8. A character set comprising both letters and numbers.
  8. 10. A command written in SQL used to communicate with and manipulate data in a database.
  9. 11. A secure, temporary, alphanumerical code used for authentication that only works one time.
  10. 13. A malicious SQL code injected into a database to allow attackers to view or modify data in a database without authorization.
  11. 16. A standardized, structured collection of data.