Module 7 Puzzle
Across
- 1. Accessed to find postings from or about your target
- 5. This conflict in 1990 had the first known cyber warfare component
- 9. The NSA and ______ have allegedly had one of their cyber spies caught in the past
- 10. Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
- 13. This command shows any shared files that are open
- 14. This website is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
- 15. This type of warfare often involves propaganda and disinformation campaigns
- 17. Modeling language used by systems engineers
- 18. The process of finding names, addresses, and phone numbers using popular websites like Yahoo
- 19. Using the Internet to terrorize someone or some group of individuals
Down
- 2. This matrix is the most appropriate tool for capturing the requirements of any security process or system
- 3. This type of diagram shows how any entity might interact with a system
- 4. Cyber criminals can use your personal information to guess these
- 6. A political group that has used the internet for political intimidation
- 7. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- 8. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- 11. This type of "data" is data relevant to an investigation
- 12. The most popular search engine used to gather personal information
- 16. This website has been a focus of identity theft criminals to gain access to personal data and pictures
- 17. Linux stores these logs at the following location /var/log/mail.*