wow

1234567891011121314151617181920
Across
  1. 2. A secret word or phrase that is used to access a computer system or service
  2. 5. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  3. 7. Customizable additions to software for extra functionality.
  4. 9. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  5. 10. The deliberate use of someone else's identity, typically for financial gain.
  6. 14. A simple form of code for software that can be written in word editors.
  7. 15. Hacking that is meant to do minimal damage and is usually done out of curiosity.
  8. 18. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  9. 19. When an attacker inputs many passwords in the hope that it is eventually guessed correctly.
  10. 20. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
Down
  1. 1. Software that has their code listed as free to use, share, and modify.
  2. 3. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  3. 4. Admin control: Having _____ control of any given system.
  4. 6. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
  5. 8. A computer program that records keystrokes made by a user. This user is typically unaware that their actions are being monitored and that a hacker now has access to passwords and other confidential data.
  6. 11. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. 12. Software that can only be run for a limited amount of time before it expires.
  8. 13. A previously unknown, bug, flaw, or backdoor in software. An attack happens once this flaw is exploited and attackers release malware before the flaw can be patched.
  9. 16. The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.
  10. 17. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.