RU ITEC411 Chapter 5 Crime and Security

1234567891011121314151617
Across
  1. 3. _____ hat hackers only hack with consent to help people secure their systems
  2. 4. a program/code that allows a computer to bypass all security in a program/system it is in
  3. 5. Verbal defamation
  4. 8. Identification using unique biological characteristics/data like fingerprints
  5. 10. Fake systems that pretend to be important systems to attract and gain information on hackers
  6. 12. Written defamation
  7. 15. The acronym for the act that was created in 1984 and makes it illegal to access a computer without authorization
  8. 16. A Social Engineering technique that uses voice messages to trick people into giving away important information
  9. 17. A Social Engineering technique that uses email to trick people into giving away important information
Down
  1. 1. A part of a computer system that monitors and blocks data from untrustworthy sources
  2. 2. Hacking telephone systems, Done in the early days of hacking by using tone emitters to get free calls
  3. 4. a group of computers compromised by malware and that take orders from a central host
  4. 6. Computer Specialists in this field find evidence on computers even if it was deleted
  5. 7. The name for the first instance of the Internet, created by a branch of the U.S. Department of Defense
  6. 9. _____ hat hackers hack people without consent, usually to steal from or inflict damage on systems
  7. 10. Hacking used with a political agenda
  8. 11. A computer worm that was discovered in 2008 that was made to attack uranium enrichment facilities
  9. 13. Unauthorized access to a computer
  10. 14. A Social Engineering technique that uses SMS/text messaging to trick people into giving away important information
  11. 17. Fake websites that pretend to be legit websites to steal data from users