RU ITEC411 Chapter 5

1234567891011121314151617181920
Across
  1. 4. a scam that asks the user to call a nunmber to confirm their personal information
  2. 5. malware that appears to be a harmless piece of software but its really a malicious virus.
  3. 6. where the criminal takes another persons identity
  4. 8. a program that infects and encrypts everything on a users device
  5. 10. tricking someone into giving their personal information
  6. 13. retrieves evidence from computers even if they've been deleted or erased
  7. 15. malware that can monitor and record user activities on a computer or mobile device.
  8. 16. crime used to gain money , services and other information
  9. 18. hackers send fake txts to get your personal information
  10. 19. a set of computers all on one network with a virus that is controlled by a hacker
  11. 20. fake websites that get your personal and financial information
Down
  1. 1. who receives all the identity theft cases and complaints
  2. 2. hackers send fake emails trying to get your personal information
  3. 3. software on a computer that keeps viruses from attacking your computer
  4. 7. trace viruses and hacking attacks
  5. 9. use their skills to demonstrate vulnerabilities and improvements to security
  6. 11. unauthorized access to a computer system
  7. 12. attacks that shutdown websites
  8. 14. a cpu worm that finds and infects a certain piece of industrial hardware
  9. 17. filter out content from untrusted websites and devices