An agreement between two or more entities to allow access to data or information. Details the controls that are to be put in place to protect the data, including how the data will be used, stored, shared and disposed of.
A cipher selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. The algorithm is a sixteen round block cipher which uses a 64bit block and a 56bit key.
Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet.
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures the organisation is to follow in the event of a disaster.
A set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies. (United States of America Federal.)
A message authentication code that makes use of a cryptographic key along with a hash function.
The ability of the anti-virus software to detect patterns of behavior on the machine
Heuristic Scanning
A system that monitors a network for malicious activities such as security threats or policy
A software update comprised code inserted (or patched) into the code of an executable program.
The security-oriented probing of a computer system or network to seek out vulnerabilities
Pen Test
A software program that provides cryptographic privacy and authentication for data communication.
A hacker gains access to a group of computers and then uses them to carry out a variety of attacks on other computers
Botnet attack
Cross-site request forgery (or “sea-surf”) attack. Malware from someone who appears to be a trusted user of a site
XSRF attack
Distributed denial of service attack. Flooding a network or website or network with requests, making it impossible for legitimate users to access the site
DDoS attack
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result
Hoax email
Recording the keystrokes made by an authorized user
Key logging
Redirecting users from a legitimate site to a bogus one; information entered on the phony site is captured for fraudulent purposes
Directing users to a bogus site through an email that appears legitimate; information entered on the phony site is captured for fraudulent purposes
Restricts access to a computer; owner must pay ransom to have it removed
Making small, undetectable changes over an extended period of time; “penny shaving” is a type of salami attack
Salami attack
Scam software that appears to be legitimate, to encourage download
Phishing using text messages rather than emails
Accessing a secure network by changing the remote computer’s IP address to that of a computer with special privileges; often used in DDoS attacks
Tricking a user (through an email or phone call) into entering credit card information into a bogus voice response system; information entered into the phony system is captured for fraudulent purposes
Cross-site scripting attack. Malware injected into a trusted site, presented through a hyperlink
XXS attack
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one
Website defacement

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Internet Terms

10 terms
Created on Feb 19, 2016

Cyber Security

15 terms
Created on Mar 23, 2016

Digital Technology

15 terms
Created on Mar 23, 2016

Cyber Security

20 terms
Created on Apr 25, 2016


20 terms
Created on May 17, 2016

Computer Terms

15 terms
Created on Jun 16, 2016

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Computer Basics !

20 terms
Created on Aug 12, 2016

Computer Basics

20 terms
Created on Aug 12, 2016


26 terms
Created on Aug 12, 2016

Introduction to Web Design- Crossword 1

18 terms
Created on Sep 13, 2016

System Software

20 terms
Created on Oct 13, 2016

Computer Networks

20 terms
Created on Oct 19, 2016


20 terms
Created on Nov 15, 2016

Computer Safety

25 terms
Created on Jan 9, 2017


21 terms
Created on Jan 30, 2017

Internet Safety Crossword

27 terms
Created on Apr 5, 2017

Internet Safety

15 terms
Created on Apr 26, 2017

IT&S Cyber Security Crossword Puzzle

16 terms
Created on Jun 2, 2017

OPSEC is not Puzzling

20 terms
Created on Nov 14, 2017