RU ITEC411 Chapter 5 Crime and Security
Across
- 3. _____ hat hackers only hack with consent to help people secure their systems
- 4. a program/code that allows a computer to bypass all security in a program/system it is in
- 5. Verbal defamation
- 8. Identification using unique biological characteristics/data like fingerprints
- 10. Fake systems that pretend to be important systems to attract and gain information on hackers
- 12. Written defamation
- 15. The acronym for the act that was created in 1984 and makes it illegal to access a computer without authorization
- 16. A Social Engineering technique that uses voice messages to trick people into giving away important information
- 17. A Social Engineering technique that uses email to trick people into giving away important information
Down
- 1. A part of a computer system that monitors and blocks data from untrustworthy sources
- 2. Hacking telephone systems, Done in the early days of hacking by using tone emitters to get free calls
- 4. a group of computers compromised by malware and that take orders from a central host
- 6. Computer Specialists in this field find evidence on computers even if it was deleted
- 7. The name for the first instance of the Internet, created by a branch of the U.S. Department of Defense
- 9. _____ hat hackers hack people without consent, usually to steal from or inflict damage on systems
- 10. Hacking used with a political agenda
- 11. A computer worm that was discovered in 2008 that was made to attack uranium enrichment facilities
- 13. Unauthorized access to a computer
- 14. A Social Engineering technique that uses SMS/text messaging to trick people into giving away important information
- 17. Fake websites that pretend to be legit websites to steal data from users