RU ITEC411 - Crime and Security
Across
- 2. Device used to record credit card information at a physical card reader.
- 4. Web sites created that entice hackers, to study and record data.
- 5. Software that allows access to a device at a future time by bypassing security checks.
- 7. Acronym for law passed by Congress in 1984 to combat cybercrime.
- 9. A sophisticated worm used against a uranium enrichment plant in Iran.
- 14. Malicious software.
- 15. Group of devices that are infected with malware and controlled by a hacker.
- 16. What a creative programmer was called back in the 1960's-197-'s.
- 17. Voice technique used to steal information.
- 18. The color of the hat a hacker wears if they hack to improve security and demonstrate vulnerabilities.
- 19. The act of creating fake web sites to steal personal information from unsuspecting users.
Down
- 1. The term used to describe an extremely clever piece of code back in the 1960's-1970's.
- 2. Malware used to record and monitor a user's activities on a device.
- 3. The color of the hat a hacker wears if they hack maliciously.
- 6. Malware that encrypts a device and demands payment to unlock it.
- 8. Biological characteristics that are unique to your person.
- 10. Text message technique used to steal information.
- 11. A form of hacking used to promote a political cause.
- 12. Attack used to cut off service to a server/web site using a Botnet.
- 13. E-mail technique used to steal information.