CRIJ 3320 eCrossword Puzzle 15
Across
- 3. Involve overwhelming an e-mail system with an enormous amount of mail.
- 6. Hackers who work to protect systems rather than harm them.
- 9. A computer crime in which small slices (amounts of money) are taken from many accounts and transferred to that of the thief.
- 11. The idea that change takes place unevenly—technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.
- 13. Malicious software whose only purpose is to damage or perform unwanted actions on computer systems.
- 15. Represent an electronic version of letting perverted bogeyman into a child’s bedroom.
- 17. An old, low-tech standby in which crackers seek out old manuals, memos, program printouts, internal phone books, and other items from which to retrieve user information.
- 22. Crime that uses the computer as a tool in crime commission.
- 23. Those who illegally reproduce and use software.
- 24. Intended or planned consequences of social change.
- 26. Malicious Internet user.
- 28. Creates a false (shadow) version of a website that is controlled by the attacker.
- 29. Ill-intended hackers who attempt to crack (break into) computer systems, often in order to do damage.
- 30. Used to gain passwords to access accounts.
- 31. The stereotypical hacker who is a criminal.
- 32. Entails a cracker stealing password, account, or credit card information.
- 33. Compromised or remotely controlled computers.
Down
- 1. Automatic speed dialers used by computers hackers.
- 2. Replacement of human mental processes by machines.
- 4. Similar to viruses that reproduce themselves and subvert computer systems but can spread with no assistance.
- 5. Computer programs that seek out and destroy viruses.
- 7. Also known as logic bombs; computer programs that perform a task, such as printing a message or destroying data, on a certain date.
- 8. The manipulation of people in order to obtain critical information about a computer or network system.
- 10. Procedures that ask a panel of experts to predict the future.
- 12. Items that are in high demand to be stolen.
- 14. A secret, malicious computer program hidden within other programs.
- 16. Unintended, negative, or hidden consequences of social change.
- 18. Computer hackers who develop harmful programs.
- 19. Rogue programs that copy themselves onto other programs or disks.
- 20. Hides text or information within other information or images.
- 21. Unwanted electronic guests regardless of motive.
- 25. That there should be no restrictions on their right to surf the Internet and test systems.
- 27. Consists of guessing numerous common passwords in order to log on to a computer system.