Lesson 1.1.1

1234567891011121314151617181920212223
Across
  1. 4. A set of rules and guidelines that outline the acceptable behaviors and responsibilities for users in a specific environment, often in workplaces or online platforms.
  2. 7. Script A file containing Python code that can be executed to perform a series of tasks or automate processes.
  3. 11. An individual or group that carries out phishing attacks by sending deceptive emails or messages to steal personal information.
  4. 12. A software-based emulation of a computer that runs programs and applications just like a physical computer, but in a controlled, isolated environment.
  5. 16. Online platforms that enable users to create, share content, and interact with others (e.g., Facebook, Twitter, Instagram).
  6. 18. The last segment of a domain name, such as .com, .org, or .edu, used to classify domain names into categories based on purpose or geographical location.
  7. 19. A task automation and configuration management framework from Microsoft, consisting of a command-line shell and scripting language built on the .NET framework.
  8. 21. A command used in operating systems to change the current directory in the command-line interface.
  9. 22. A type of challenge-response test used to determine whether the user is human and to prevent bots from accessing websites or services.
  10. 23. Lifecycle The continuous process of protecting systems, networks, and data through identifying risks, implementing protective measures, detecting incidents, responding to threats, and recovering from attacks.
Down
  1. 1. The process of converting data into a code to protect it from unauthorized access, requiring a decryption key to read the information.
  2. 2. A step-by-step procedure or formula for solving a problem, often used in computing and data processing.
  3. 3. Attack A type of attack where a hacker tries a list of commonly used passwords or words from a dictionary to gain access to a system.
  4. 5. Footprint The trail of data you leave behind when you use the internet, including websites you visit, emails you send, and social media activity.
  5. 6. Unsolicited and irrelevant messages sent over the internet, typically in bulk, usually for advertising purposes.
  6. 8. A fraudulent attempt to obtain sensitive information such as passwords and credit card details by posing as a trustworthy entity via email or other online communication.
  7. 9. Extension The suffix at the end of a filename that indicates what type of file it is (e.g., .txt for text files, .doc for Word documents).
  8. 10. The process of giving someone permission to access resources or perform certain actions on a system.
  9. 13. a Password The process of using various techniques, such as brute force or dictionary attacks, to guess or break the password protecting a system or account.
  10. 14. Source The origin of an email, which includes information such as the sender's IP address and server details, often found in the email header.
  11. 15. A command in Windows that displays a list of files and directories in the current directory.
  12. 17. A method used to crack passwords by trying every possible combination of characters until the correct one is found.
  13. 20. The process of verifying the identity of a user, device, or system to ensure they are who they claim to be.