ITS2210 Module 7 Crossword
Across
- 2. This type of loss is the most likely damage to occur in an act of cyber terrorism
- 7. Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
- 10. Hacking conducted for ideological purposes
- 11. Using the Internet to terrorize someone or some group of individuals
- 12. Accessed to find postings from or about your target
- 14. The most popular search engine used to gather personal information
- 15. Cyber criminals can use your personal information to guess these
- 19. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- 20. Linux stores these logs at the following location /var/log/mail.*
Down
- 1. This virus is an example of domestic cyber terrorism
- 3. This command shows any shared files that are open
- 4. This type of warfare often involves propaganda and disinformation campaigns
- 5. This website has been a focus of identity theft criminals to gain access to personal data and pictures
- 6. This type of "data" is data relevant to an investigation
- 8. The process of finding names, addresses, and phone numbers using popular websites like Yahoo
- 9. A political group that has used the internet for political intimidation
- 13. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- 16. Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
- 17. This conflict in 1990 had a cyber warfare component
- 18. The NSA and ______ have allegedly had one of their cyber spies caught