Crossword Puzzle (CYBERCRIME)
Across
- 5. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- 6. A politically- or ideologically-motivated cyber attack or hack.
- 7. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- 10. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- 11. or operating in transnational several nations
- 12. The act of one individual harassing or intimidating another individual via the Internet.
- 13. define as “malicious software” specifically designed to gain access to or damage a computer
- 15. the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
- 16. the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
- 17. A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
- 18. an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
- 22. other terms for cybercrime
- 26. These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
- 29. hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
- 30. The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- 33. (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
- 34. An online journal. Contraction of the term “web log.”
- 35. The overarching program that runs all the functions on a computer or other electronic device.
- 36. administrator An individual who manages and oversees a network.
- 38. sexual arousal involving communication on the internet
- 39. A program that masks something harmful, such as a worm or virus, that it carries into a device.
- 40. A group of computers that is linked to share data and other information.
- 42. A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- 45. hacker objective is to find black hat hackers, intercept and destroy their schemes.
- 47. Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
- 48. A massed data that is used to describe large amounts of other Internet data.
- 49. A website that finds information across the Internet based on a set of search criteria.
- 50. the activity of converting data or information into code
Down
- 1. A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
- 2. Unsolicited advertising or other information sent out via email or other messaging service.
- 3. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- 4. They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
- 8. This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
- 9. A company that offers access to the Internet.
- 14. crime that involves a computer and a network.
- 19. An information packet sent from a website to a web browser that records a user’s activity on that website.
- 20. A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- 21. These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
- 23. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- 24. A satellite navigation system that identifies the precise location of the transmitting device.
- 25. Malicious software, such as a virus or a worm, that attacks a target computer.
- 27. when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
- 28. someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
- 31. someone who attempts to prevent terrorism or intended to prevent terrorism
- 32. These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
- 34. A way to access an electronic system by bypassing some or all security mechanisms.
- 37. A username and password used to identify an individual attempting to gain access to a restricted page or network.
- 41. A software robot that performs automated tasks.
- 43. it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
- 44. an assault on electronic communication networks
- 46. A camera connected to a computer, generally used to then stream videos to the Internet.