Across
- 1. a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
- 3. An observable occurrence or sign that an attacker may be preparing to cause an incident.
- 4. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- 10. set of instructions to help IT staff detect, respond to, and recover from network security incidents.
- 12. a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
- 15. a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
- 20. ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
- 26. strategy used to make sure users do not send critical information outside of a corporate network.
- 30. an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
- 33. integrated collection of security measures to prevent unauthorized access to a networked computer system
- 37. a cyberattack on a server, service, website, or network floods it with Internet traffic.
- 39. identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
- 40. the unauthorized movement of information being spread throughout the internet.
- 42. Authentication via group
- 48. a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
- 49. used to detect malware.
- 50. a system that allows web hosts to distinguish between human and automated access to websites.
- 51. Someone or Something that authenticates
- 52. a standalone malware computer program that replicates itself in order to spread to other computers.
- 53. science concerned with data communication and storage in secure and usually secret form.
- 54. related to cloud computing, in which it can hold information and photos.
- 56. to successfully escape from an area under enemy control.
- 57. Source code that is free to copy and modify.
- 58. an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
- 60. Hacker who violates computer security for personal gain or malice.
- 61. is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
- 62. The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
- 63. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
- 2. an evaluation of events that can adversely affect operations and/or specific assets
- 5. a type of monitoring software designed to record keystrokes made by a user.
- 6. Source code that is not available
- 7. the psychological manipulation of people into performing actions or divulging confidential information.
- 8. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- 9. software that displays unwanted advertisements on your computer.
- 11. the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- 13. code that takes advantage of a vulnerability of flaw.
- 14. a set of changes to a computer program or its supporting data designed to update, fix, or improve it
- 16. an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
- 17. List of people under suspicion, disfavor, etc.
- 18. internet protocol address, which identifies the number associated with a specific computer or network.
- 19. an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
- 21. are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
- 22. any malware which misleads users of its true intent.
- 23. A thing that supports another thing
- 24. Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
- 25. an attack on the internet that is used to steal usernames and passwords from the network.
- 27. a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
- 28. a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
- 29. keeping data safe
- 31. process of collecting and searching through a database to discover information.
- 32. a computer network that provides online privacy by creating an encrypted connection on the Internet.
- 34. it ensures a person’s identity matches with who they are.
- 35. a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
- 36. a person who operates the command and control of botnets for remote process execution.
- 38. when data is coded a certain way to disallow others from seeing that information.
- 41. a collection of internet-connected devices infected by malware that allow hackers to control them.
- 43. offensive security professionals who are experts in attacking systems and breaking into defenses.
- 44. a type of malware that is often disguised as legitimate software.
- 45. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
- 46. identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
- 47. the methods that adversaries use to breach or infiltrate your network.
- 49. Number generated from a string of text
- 50. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- 55. to convert information into cipher
- 59. short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.