Per. 2 Cyber Security Words and Terms Puzzle Maker

1234567891011121314151617181920
Across
  1. 3. A cyber attacker who uses software and social engineering methods to steal data and information.
  2. 5. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  3. 6. The method of obtaining user information through fraudulent communications targeted directly at people
  4. 7. A test that distinguishes between robots and humans using a website.
  5. 9. typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, can corrupt data or expand throughout a network and damage systems across a company.
  6. 11. Program that automatically execute tasks as ordered by the creator of the program.
  7. 14. A language used to create and control the content on a website.
  8. 16. official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  9. 17. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
  10. 18. The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
  11. 19. A simple form of code for software that can be written in word editors.
  12. 20. An error, flaw, failure, or fault in a computer program or system.
Down
  1. 1. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  2. 2. seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  3. 4. Software that can only be run for a limited amount of time before it expires.
  4. 6. A secret word or phrase that is used to access a computer system or service.
  5. 8. Text that can be read by the human eye, like google results for how to make eggs.
  6. 10. The programs and other operating systems used by a computer.
  7. 11. An alternative way to access software or hardware.
  8. 12. A form of malicious software that disguises itself as a harmless computer program.
  9. 13. An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
  10. 15. Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.