CRIJ 3320 eCrossword Puzzle 15

123456789101112131415161718192021222324252627282930313233
Across
  1. 3. Involve overwhelming an e-mail system with an enormous amount of mail.
  2. 6. Hackers who work to protect systems rather than harm them.
  3. 9. A computer crime in which small slices (amounts of money) are taken from many accounts and transferred to that of the thief.
  4. 11. The idea that change takes place unevenly—technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.
  5. 13. Malicious software whose only purpose is to damage or perform unwanted actions on computer systems.
  6. 15. Represent an electronic version of letting perverted bogeyman into a child’s bedroom.
  7. 17. An old, low-tech standby in which crackers seek out old manuals, memos, program printouts, internal phone books, and other items from which to retrieve user information.
  8. 22. Crime that uses the computer as a tool in crime commission.
  9. 23. Those who illegally reproduce and use software.
  10. 24. Intended or planned consequences of social change.
  11. 26. Malicious Internet user.
  12. 28. Creates a false (shadow) version of a website that is controlled by the attacker.
  13. 29. Ill-intended hackers who attempt to crack (break into) computer systems, often in order to do damage.
  14. 30. Used to gain passwords to access accounts.
  15. 31. The stereotypical hacker who is a criminal.
  16. 32. Entails a cracker stealing password, account, or credit card information.
  17. 33. Compromised or remotely controlled computers.
Down
  1. 1. Automatic speed dialers used by computers hackers.
  2. 2. Replacement of human mental processes by machines.
  3. 4. Similar to viruses that reproduce themselves and subvert computer systems but can spread with no assistance.
  4. 5. Computer programs that seek out and destroy viruses.
  5. 7. Also known as logic bombs; computer programs that perform a task, such as printing a message or destroying data, on a certain date.
  6. 8. The manipulation of people in order to obtain critical information about a computer or network system.
  7. 10. Procedures that ask a panel of experts to predict the future.
  8. 12. Items that are in high demand to be stolen.
  9. 14. A secret, malicious computer program hidden within other programs.
  10. 16. Unintended, negative, or hidden consequences of social change.
  11. 18. Computer hackers who develop harmful programs.
  12. 19. Rogue programs that copy themselves onto other programs or disks.
  13. 20. Hides text or information within other information or images.
  14. 21. Unwanted electronic guests regardless of motive.
  15. 25. That there should be no restrictions on their right to surf the Internet and test systems.
  16. 27. Consists of guessing numerous common passwords in order to log on to a computer system.