SITE ME DOWN, SITE ME UP

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 3. the process of returning a system back to a state of normalcy.
  2. 5. crime related to technology, computers, and the Internet
  3. 6. a person who hacks telephone systems, usually for the purpose of making free phone calls
  4. 7. a type of malware that functions by spying on user activity without their knowledge.
  5. 10. a term sometimes used to describe a person who pursues knowledge of computer and security systems for its own sake
  6. 12. the act which transforms plaintext or cleartext into ciphertext
  7. 15. slang for pirated software
  8. 16. unsolicited commercial email
  9. 20. the process of disguising one computer user as another
  10. 24. the process of trying to overcome a security measure
  11. 25. protecting information or hiding its meaning by converting it into a secret code
  12. 28. a group of computers that is linked to share data and other information.
  13. 30. a person who combines phone phreaking with computer hacking
  14. 31. a technology that allows us to access our files and/or services through the internet from anywhere in the world.
  15. 33. a data string used to verify the identity of a user
  16. 34. data that has been encrypted
  17. 37. an audio or video clip that has been edited and manipulated to seem real or believable.
  18. 39. a computer system that resides on a network and can independently communicate with other systems on the network
  19. 40. a flaw in a security device
  20. 42. process of bypassing the security systems on a computer system or network
  21. 43. an error or mistake in software coding or hardware design or construction.
  22. 45. an application that allows the sending of messages between computer users via a network
  23. 46. to make a copy of data stored on a computer or server to reduce the potential impact of failure or loss
  24. 48. the process of protecting information or hiding its meaning by converting it into a code
  25. 50. an online journal. Contraction of the term “web log.”
Down
  1. 1. an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later
  2. 2. a set of programs that tell a computer to perform a task.
  3. 4. the interception of electronic communications in order to access information
  4. 8. a program used to access the Internet.
  5. 9. group of computers, printers and devices that are interconnected and governed as a whole.
  6. 11. a computer program designed to make copies of itself and spread itself from one machine to another without the help of the user
  7. 13. the use of a computer user's unique physical characteristics
  8. 14. the proper term to refer to an unauthorized attacker of computers, networks and technology
  9. 17. a discrete block of data sent over a network
  10. 18. a security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
  11. 19. the act of illegally copying software, music, or movies that are copyright-protected
  12. 21. a computer network that uses the Internet protocol family
  13. 22. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  14. 23. a malicious application or script that can be used to take advantage of a computer’s vulnerability.
  15. 26. a trap or decoy for attackers.
  16. 27. another kind of malware that allows cybercriminals to remotely control your computer.
  17. 29. a computer program that copies itself across a network
  18. 32. the process of converting encrypted information back into normal, understandable text
  19. 35. a social engineering attack that attempts to collect information from victims.
  20. 36. refers to any piece of software or application that displays advertisements on your computer.
  21. 38. a device designed to enforce the boundary between two or more networks, limiting access
  22. 41. a program designed to capture information across a computer network
  23. 44. an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
  24. 47. a type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  25. 49. an information packet sent from a website to a web browser that records a user’s activity on that website.