RU ITEC411 Chapter 5 Crime and Security
Across
- 2. Security system to block unwanted stuff
- 4. Scamming people through fake text messages
- 5. Scamming people through fake phone calls
- 7. Law that makes unauthorized access illegal
- 9. Mixing information up so its unable to be read
- 11. Fake system to study hackers
- 15. Damaging / breaking into a computer network
- 16. Providing identification to access
- 17. Identifying someone using face scan or fingerprints
Down
- 1. Harmful program on your computer
- 3. Scamming people through fake emails
- 4. Protecting devices from everything
- 6. Impersonating someone with their information
- 8. Computer program that spreads through devices
- 10. Scamming people through fake redirecting websites
- 11. Hacking but used for political issues
- 12. Investigating computers for evidence for a crime
- 13. Breaking into a computer without permission
- 14. Stealing money using fake information