Chapter 5: Crime & Security
Across
- 2. A virus that encrypts data on a device and demanding a ransom in order to unlock said data
- 3. emails convincing victims to use a fake website that appears to be well known
- 9. Manipulating people to voilate security protocols
- 10. creating fake website to lure uninformed victems in order to steal personal data
- 12. malware that attaches or spreads itself to infect other software
- 13. process of converting data files into an unreadable code to prevent unauthorized access and viewership
- 14. (CFAA)
- 15. software that does not attach itself ,created to exploit software/system flaws
- 16. Illegal malware that monitors and steals data without the knowledge or consent of an individual
- 18. (CERT)developed standards for coding and software development
Down
- 1. Illegally breaking into devices and releasing viruses
- 4. hacking in order to display support or promote a political cause.
- 5. A US&Isreal government collaboration project used to successfully destroy irans nuclear weapons production
- 6. (OS),controls access to hardware/software avaible to users
- 7. malware that appear to be harmless software
- 8. Biological markers of an individual used for identification
- 11. Crashing servers by overwhelming data traffic with packets and frames
- 17. legally breaking into computer systems/software to test security/software integrity