CYBERCRIME
Across
- 4. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 6. generally use for encryption process.
- 8. parts of internet not fully accessible through standard search engines like google or yahoo.
- 12. SMS means?
- 13. father of First handed cellular phone.
- 16. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 18. an application that allows the sending of message between computer via a network.
- 20. a person who combines phone phreaking with computer hacking.
- 22. a data string used to verify the identity of a user
- 23. a location service that allows cell towers and sattillites to pin point where you are in the world.
- 24. type of display device technology sharper and more battery efficient than LCD.
- 25. any code that is intentionally included in software or hardware for an unauthorized purpose.
- 27. a crypto hash which function is input bit hash value.
- 28. the process of examining data traffic for the purpose of finding passwords to use later in masquerading attacks
- 29. in criminal cases, the person charge is referred to as :
- 32. a low power short range wireless technology design to provide a replacement for the serial cable.
- 34. the right of individual to control the collection of access to, and use personal information about him or her.
- 38. a vertual cabinet for storing your mobile devices files.
- 39. first cellphone invented in history of electronic communication.
- 41. a hacker whose intentions are not criminal or malicious.
- 42. a piece of software designed and created to update a computer program to improve it.
- 43. a Smart phone operating system developed by Google.
- 44. 4G-LTE;5G-
- 45. the person who developed back rub.
- 46. the process of taking over a live connection between two users so that the attacker can masquerade as one of the users.
- 48. the leftover space on a device where a file is store.
- 49. he emerge as the father of instrument.
Down
- 1. two words when combined hold the most letters.
- 2. the property that information is not made available to unauthorized individual.
- 3. refers to any tool that permits read only access to data storage without compromising the integrity of data.
- 5. it is also called transceiver jargon.
- 7. malicious code or program written to alter the way computer operates.
- 9. search algorithm and initially search engine develop by Larry page.
- 10. a device that records the telephone numbers of calls received by a particular telephone
- 11. program designed to breach the security of a computer system while ostensibly performing some innocuous function.
- 14. the internal space or environment created by linking computer together into communication network.
- 15. a volatile memory that temporarily store the files you are working on.
- 17. the act of illegally copying digital material posted online into the storage medium on ones computer.
- 19. hard drive-spinning disk; solid state drive?
- 21. the process of disguising one computer user as another.
- 26. an attack that causes the targeted system to be unable to fulfill its intended function.
- 30. protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network.
- 31. is one in which the ingredients of the offenses are committed in many places.
- 33. slang for pirated software.
- 35. the evolution of mobile communication that is massive and seamless end to end connectivity and mobility.
- 36. a data string used to verify the identity of user.
- 37. a features that allows other devices to share the mobile internet data of your mobile phone.
- 38. service which enables users to bar certain incoming or out going calls on there mobile phones.
- 40. what comes before exabyte.
- 46. the language in which most webpage are written.
- 47. any data, device or component that support information related activities.