SITE ME DOWN, SITE ME UP

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 4. the process of returning a system back to a state of normalcy.
  2. 6. a type of malware that functions by spying on user activity without their knowledge.
  3. 9. the act of illegally copying software, music, or movies that are copyright-protected
  4. 11. a social engineering attack that attempts to collect information from victims.
  5. 13. a computer system that resides on a network and can independently communicate with other systems on the network
  6. 14. a person who hacks telephone systems, usually for the purpose of making free phone calls
  7. 15. a program used to access the Internet.
  8. 18. a person who combines phone phreaking with computer hacking
  9. 19. a group of computers that is linked to share data and other information.
  10. 20. the act which transforms plaintext or cleartext into ciphertext
  11. 21. group of computers, printers and devices that are interconnected and governed as a whole.
  12. 25. an online journal. Contraction of the term “web log.”
  13. 26. the interception of electronic communications in order to access information
  14. 28. crime related to technology, computers, and the Internet
  15. 29. a device designed to enforce the boundary between two or more networks, limiting access
  16. 30. an information packet sent from a website to a web browser that records a user’s activity on that website.
  17. 32. the process of protecting information or hiding its meaning by converting it into a code
  18. 34. the process of converting encrypted information back into normal, understandable text
  19. 37. unsolicited commercial email
  20. 38. an audio or video clip that has been edited and manipulated to seem real or believable.
  21. 40. the process of disguising one computer user as another
  22. 41. a malicious application or script that can be used to take advantage of a computer’s vulnerability.
  23. 44. refers to any piece of software or application that displays advertisements on your computer.
  24. 46. the use of a computer user's unique physical characteristics
  25. 47. a computer program that copies itself across a network
Down
  1. 1. a type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  2. 2. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  3. 3. protecting information or hiding its meaning by converting it into a secret code
  4. 5. a program designed to capture information across a computer network
  5. 7. a trap or decoy for attackers.
  6. 8. an error or mistake in software coding or hardware design or construction.
  7. 10. a data string used to verify the identity of a user
  8. 12. process of bypassing the security systems on a computer system or network
  9. 15. to make a copy of data stored on a computer or server to reduce the potential impact of failure or loss
  10. 16. another kind of malware that allows cybercriminals to remotely control your computer.
  11. 17. the process of trying to overcome a security measure
  12. 22. an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
  13. 23. a term sometimes used to describe a person who pursues knowledge of computer and security systems for its own sake
  14. 24. data that has been encrypted
  15. 25. a security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
  16. 27. an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later
  17. 28. a technology that allows us to access our files and/or services through the internet from anywhere in the world.
  18. 31. a flaw in a security device
  19. 33. a computer network that uses the Internet protocol family
  20. 35. an application that allows the sending of messages between computer users via a network
  21. 36. a discrete block of data sent over a network
  22. 39. a set of programs that tell a computer to perform a task.
  23. 42. slang for pirated software
  24. 43. the proper term to refer to an unauthorized attacker of computers, networks and technology
  25. 45. a computer program designed to make copies of itself and spread itself from one machine to another without the help of the user