Unit Vocab

123456789101112131415
Across
  1. 1. a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures.
  2. 5. any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices
  3. 6. A hacker that violates computer security for their own profit or gain
  4. 10. the process of recognizing a user's identity'
  5. 12. a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
  6. 14. an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol.
  7. 15. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected"
Down
  1. 2. parts of the Internet not fully accessible through standard search engines
  2. 3. measurement and statistical analysis of people's unique physical and behavioral characteristics
  3. 4. a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities
  4. 7. people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.
  5. 8. a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means
  6. 9. the gaining of unauthorized access to data in a system or computer.
  7. 11. the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  8. 13. a social or political activist act that is carried out by breaking into and wreaking havoc on a secure computer system