a vulnerability intentionally left in the security of a computer system or its software by its designers
back door
ciphertext
data that has been encrypted
any action or device that reduces a computer system's vulnerability
countermeasure
looking through trash for access codes or other sensitive information
dumpster diving
a device designed to enforce the boundary between two or more networks, limiting access
firewall
the process of taking over a live connection between two users so that the attacker can masquerade as one of the users
hijacking
using a password or user ID obtained in one attack to commit another attack
leapfrog attack
an email containing live data intended to cause damage to the recipient's computer
letterbomb
a device that records the telephone numbers of calls received by a particular telephone
pen register
a person who combines phone phreaking with computer hacking
phracker
a person who hacks telephone systems, usually for the purpose of making free phone calls
phreaker
gaining unauthorized access to a computer system via another user's legitimate connection
piggyback
slang for pirated software
warez
A non-malicious surprise contained in a program or on a circuit board installed by the developer.
Easter Egg
The payload is the part of the malware program that actually executes its designed task.
Payload
is a form of social engineering carried out by black hats in electronic form, usually by email, with the purpose of gathering sensitive information.
Phishing
Considered the original computer hackers, hit the scene in the 60s and made their mark by circumventing telecommunications security systems to place calls, including long distance, for free.
Phreaker
An individual who does not possess, or just doesn’t use, their own skills and know-how to hack or crack a computer system or network, but uses a pre-written program or piece of code, a script, to do the dirty work.
Script Kiddie
is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network.
Wardriving
Parallel websites that allow children to get around filtering software and access sites that have been blocked
Circumventor Sites
Any Internet-related illegal activity.
Cybercrime
Any technique, software, etc., used to protect computers and prevent online crime.
Cybersecurity
A hostile, strongly worded message that may contain obscene language.
Flame
The nickname a user has chosen to be identified by when playing Internet games.
Gamer tag
Internet gamers who intentionally cause problems and/or cyberbully other gamers (i.e., individuals who play online games).
Griefers
Rules or manners for interacting courteously with others online
Netiquette
Something of value to a person, business or organization.
Asset
Server that acts as an intermediary between users and others servers, validating user requests.
Proxy server
The process of identifying, analysing and evaluating risk.
Risk assessment
A virus or physical device that logs information sent to a visual display to capture private or personal information.
Screen scraper
An incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorised to do so.
Data Breach
Offshoring The practice of basing some of a company's processes or services overseas.
Offshoring
a personalized graphic file or rendering that represents a computer user or user’s alter ego, often used on Web exchange boards and in online gaming
Avatar
a network of private computers, infected with malicious software (malware) and controlled as a group without the owners' knowledge for nefarious and, often, criminal purposes
Botnet
a technology that uses the Internet and remote servers to maintain data and applications, allowing users to access applications without installation and access to their personal files from any computer with Internet access
Cloud computing
a criminal offense that involves using the Internet or other technology to stalk or harass an individual, a group of individuals
Cyberstalking
the global network of interdependent information technology infrastructures, telecommunications networks
Cyberspace
an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document
Digital Signature
the process of adding geographical location, or label, to photographs, videos, website, SMS messages, QR Codes, or RSS feeds
Geotagging
words or phrases prefixed with the symbol; used to mark keywords or topics in a Tweet or social networking service.
Hashtag

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Cyber Security

20 terms
Created on Apr 25, 2016

Digital Technology

15 terms
Created on Mar 23, 2016

Computer Networks

20 terms
Created on Oct 19, 2016

technology

20 terms
Created on May 17, 2016

Cyberbullying

21 terms
Created on Jan 30, 2017

Computer Basics

20 terms
Created on Aug 12, 2016

Computer Safety

25 terms
Created on Jan 9, 2017

E-Safety

20 terms
Created on Nov 15, 2016

Computer Terms

15 terms
Created on Jun 16, 2016

Computer Basics !

20 terms
Created on Aug 12, 2016

Internet Safety

15 terms
Created on Apr 26, 2017

Computer Science Vocabulary

11 terms
Created on Sep 9, 2016

Computer Crossword Puzzle

19 terms
Created on Sep 22, 2016

Review of digital literacy unit

20 terms
Created on Jun 16, 2016

Computer Terminology

10 terms
Created on Feb 8, 2017

Technology

26 terms
Created on Aug 12, 2016

Glossary Crossword

10 terms
Created on Sep 2, 2016

Introduction to Web Design- Crossword 1

18 terms
Created on Sep 13, 2016

Internet Safety

10 terms
Created on Feb 22, 2016