Per. 2 Cyber Security Words and Terms Puzzle Maker

123456789101112131415161718192021
Across
  1. 6. Software that can only be run for a limited amount of time before it expires.
  2. 7. official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  3. 8. A simple form of code for software that can be written in word editors.
  4. 11. A language used to create and control the content on a website.
  5. 12. Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
  6. 14. An alternative way to access software or hardware.
  7. 16. A test that distinguishes between robots and humans using a website.
  8. 17. An error, flaw, failure, or fault in a computer program or system.
  9. 19. Text that can be read by the human eye, like google results for how to make eggs.
  10. 21. A cyber attacker who uses software and social engineering methods to steal data and information.
Down
  1. 1. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  2. 2. seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  3. 3. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  4. 4. An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
  5. 5. Program that automatically execute tasks as ordered by the creator of the program.
  6. 9. A secret word or phrase that is used to access a computer system or service.
  7. 10. typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, can corrupt data or expand throughout a network and damage systems across a company.
  8. 13. The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
  9. 15. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
  10. 18. The programs and other operating systems used by a computer.
  11. 19. The method of obtaining user information through fraudulent communications targeted directly at people
  12. 20. A form of malicious software that disguises itself as a harmless computer program.