Share Focus Mode

Cybersecurity Words

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
Across
  1. 1. a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
  2. 3. An observable occurrence or sign that an attacker may be preparing to cause an incident.
  3. 4. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
  4. 10. set of instructions to help IT staff detect, respond to, and recover from network security incidents.
  5. 12. a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
  6. 15. a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
  7. 20. ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
  8. 26. strategy used to make sure users do not send critical information outside of a corporate network.
  9. 30. an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
  10. 33. integrated collection of security measures to prevent unauthorized access to a networked computer system
  11. 37. a cyberattack on a server, service, website, or network floods it with Internet traffic.
  12. 39. identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
  13. 40. the unauthorized movement of information being spread throughout the internet.
  14. 42. Authentication via group
  15. 48. a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
  16. 49. used to detect malware.
  17. 50. a system that allows web hosts to distinguish between human and automated access to websites.
  18. 51. Someone or Something that authenticates
  19. 52. a standalone malware computer program that replicates itself in order to spread to other computers.
  20. 53. science concerned with data communication and storage in secure and usually secret form.
  21. 54. related to cloud computing, in which it can hold information and photos.
  22. 56. to successfully escape from an area under enemy control.
  23. 57. Source code that is free to copy and modify.
  24. 58. an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
  25. 60. Hacker who violates computer security for personal gain or malice.
  26. 61. is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
  27. 62. The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
  28. 63. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
  1. 2. an evaluation of events that can adversely affect operations and/or specific assets
  2. 5. a type of monitoring software designed to record keystrokes made by a user.
  3. 6. Source code that is not available
  4. 7. the psychological manipulation of people into performing actions or divulging confidential information.
  5. 8. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  6. 9. software that displays unwanted advertisements on your computer.
  7. 11. the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. 13. code that takes advantage of a vulnerability of flaw.
  9. 14. a set of changes to a computer program or its supporting data designed to update, fix, or improve it
  10. 16. an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
  11. 17. List of people under suspicion, disfavor, etc.
  12. 18. internet protocol address, which identifies the number associated with a specific computer or network.
  13. 19. an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
  14. 21. are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
  15. 22. any malware which misleads users of its true intent.
  16. 23. A thing that supports another thing
  17. 24. Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
  18. 25. an attack on the internet that is used to steal usernames and passwords from the network.
  19. 27. a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
  20. 28. a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
  21. 29. keeping data safe
  22. 31. process of collecting and searching through a database to discover information.
  23. 32. a computer network that provides online privacy by creating an encrypted connection on the Internet.
  24. 34. it ensures a person’s identity matches with who they are.
  25. 35. a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
  26. 36. a person who operates the command and control of botnets for remote process execution.
  27. 38. when data is coded a certain way to disallow others from seeing that information.
  28. 41. a collection of internet-connected devices infected by malware that allow hackers to control them.
  29. 43. offensive security professionals who are experts in attacking systems and breaking into defenses.
  30. 44. a type of malware that is often disguised as legitimate software.
  31. 45. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
  32. 46. identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
  33. 47. the methods that adversaries use to breach or infiltrate your network.
  34. 49. Number generated from a string of text
  35. 50. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  36. 55. to convert information into cipher
  37. 59. short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.