NOVA Cybersecurity Lab Glossary

123456789101112131415161718192021
Across
  1. 2. a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
  2. 3. extra copies of computer files that can be used to restore files that are lost or damaged.
  3. 6. a computer program that can copy itself and cause harm in various ways, such as stealing private
  4. 10. the amount of data that can pass through a network or part of a network per second.
  5. 13. or destroying data.
  6. 14. a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  7. 17. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
  8. 18. someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  9. 19. a company or organization that gives users and devices access to the Internet.
  10. 21. two or more interconnected devices that can exchange data.
Down
  1. 1. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
  2. 2. a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
  3. 4. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
  4. 5. code written in a programming language that instructs computers to perform specific tasks.
  5. 7. a type of connection between devices that can exchange information and power supply.
  6. 8. a data storage device that is used to store, back up, and transfer computer files.
  7. 9. multiple computers on a network that are infected with a program that can be controlled remotely.
  8. 11. software designed to block malware from entering protected networks.
  9. 12. programs that harm computers, networks, or people.
  10. 15. viruses, worms, ransomware, and other
  11. 16. unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
  12. 19. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
  13. 20. the process of using codes to make readable information unreadable.