Per. 2 Cyber Security Words and Terms Puzzle Maker

12345678910111213141516171819
Across
  1. 1. Text that can be read by the human eye, like google results for how to make eggs.
  2. 4. A simple form of code for software that can be written in word editors.
  3. 6. A form of malicious software that disguises itself as a harmless computer program.
  4. 7. The programs and other operating systems used by a computer.
  5. 11. A test that distinguishes between robots and humans using a website.
  6. 12. A language used to create and control the content on a website.
  7. 15. The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
  8. 16. An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
  9. 17. official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  10. 18. Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
  11. 19. An error, flaw, failure, or fault in a computer program or system.
Down
  1. 1. A secret word or phrase that is used to access a computer system or service.
  2. 2. Software that can only be run for a limited amount of time before it expires.
  3. 3. seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  4. 5. An alternative way to access software or hardware.
  5. 8. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  6. 9. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  7. 10. A cyber attacker who uses software and social engineering methods to steal data and information.
  8. 11. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
  9. 13. The method of obtaining user information through fraudulent communications targeted directly at people
  10. 14. Program that automatically execute tasks as ordered by the creator of the program.