RU ITEC411 - Crime and Security

12345678910111213141516171819
Across
  1. 2. Device used to record credit card information at a physical card reader.
  2. 4. Web sites created that entice hackers, to study and record data.
  3. 5. Software that allows access to a device at a future time by bypassing security checks.
  4. 7. Acronym for law passed by Congress in 1984 to combat cybercrime.
  5. 9. A sophisticated worm used against a uranium enrichment plant in Iran.
  6. 14. Malicious software.
  7. 15. Group of devices that are infected with malware and controlled by a hacker.
  8. 16. What a creative programmer was called back in the 1960's-197-'s.
  9. 17. Voice technique used to steal information.
  10. 18. The color of the hat a hacker wears if they hack to improve security and demonstrate vulnerabilities.
  11. 19. The act of creating fake web sites to steal personal information from unsuspecting users.
Down
  1. 1. The term used to describe an extremely clever piece of code back in the 1960's-1970's.
  2. 2. Malware used to record and monitor a user's activities on a device.
  3. 3. The color of the hat a hacker wears if they hack maliciously.
  4. 6. Malware that encrypts a device and demands payment to unlock it.
  5. 8. Biological characteristics that are unique to your person.
  6. 10. Text message technique used to steal information.
  7. 11. A form of hacking used to promote a political cause.
  8. 12. Attack used to cut off service to a server/web site using a Botnet.
  9. 13. E-mail technique used to steal information.