Cybersecurity Vocabulary

1234567891011121314151617181920212223242526
Across
  1. 2. Internet-based platforms/applications that enable users to create, share, & interact with content in real time.
  2. 4. Try to discover weaknesses in programs so they can be fixed. They work directly with a company.
  3. 5. Also called Terms of Use – says what rights you have & what rights you give up when you use an app.
  4. 6. The practice of protecting systems from digital attacks, unauthorized access, damage, or disruption.
  5. 10. Can piece together data from computers and networks to find criminals.
  6. 12. Personally Identifiable Information (Name, Birth Date, Address, Social Security Number, Email Address or Password.)
  7. 13. A system of interconnected computing devices (computers, servers, printers, and mobile devices)
  8. 19. The process cell phone companies use to know the location of your devices.
  9. 21. Computer skills whiz who uses their expertise to gain unauthorized access to systems, networks, or data.
  10. 22. Everything you do online creates a trail of info. (Internet Searches, Online Shopping, Social Media Posts)
  11. 24. Artificial Intelligence
  12. 25. Images, videos, or audio created using AI
  13. 26. Malicious software (malware) that, when executed, replicates itself by modifying code in other programs. Can spy.
Down
  1. 1. Uses a combination of Law Enforcement and Tech Knowledge to solve crimes.
  2. 3. Refers to any illegal activity that involves computers, networks, or digital devices.
  3. 7. Same as Penetration Testers, but they typically work within a consulting company for many businesses.
  4. 8. Hardware, software, networks, and digital data
  5. 9. Contain info of all the tasks a digital device does – like which device, when, and who was logged in.
  6. 11. Acronym for World Wide Web
  7. 14. Writes encryption programs companies use to protect their data.
  8. 15. Digital devices you use collect data about what you’ve done (send an email/text, create a doc, take a pic)
  9. 16. Same as Penetration Testers and Ethical Hackers, but they watch for hacking being done in real time.
  10. 17. Designers of Cybersecurity Systems.
  11. 18. Deliberate/malicious attempt to breach, damage, disrupt, or gain access to networks or digital devices.
  12. 20. A cyberattack using deceptive methods (via email, text, calls, or fake websites) to trick people into revealing PII.
  13. 23. Synthetic media mimicking real people, making it appear as if someone said/did something they never did.