Across
- 1. Text that can be read by the human eye, like google results for how to make eggs.
- 4. A simple form of code for software that can be written in word editors.
- 6. A form of malicious software that disguises itself as a harmless computer program.
- 7. The programs and other operating systems used by a computer.
- 11. A test that distinguishes between robots and humans using a website.
- 12. A language used to create and control the content on a website.
- 15. The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- 16. An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
- 17. official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- 18. Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- 19. An error, flaw, failure, or fault in a computer program or system.
Down
- 1. A secret word or phrase that is used to access a computer system or service.
- 2. Software that can only be run for a limited amount of time before it expires.
- 3. seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- 5. An alternative way to access software or hardware.
- 8. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 9. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- 10. A cyber attacker who uses software and social engineering methods to steal data and information.
- 11. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
- 13. The method of obtaining user information through fraudulent communications targeted directly at people
- 14. Program that automatically execute tasks as ordered by the creator of the program.