RU ITEC 411: Crime and Security

1234567891011121314151617181920
Across
  1. 4. The US and Israel carried out a cyber-attack against this country.
  2. 6. Controls the hardware and applications on a computer for the user.
  3. 9. What does the A in CIA stand for
  4. 10. Malware that monitors your actions on a computer
  5. 12. The first era of hacking is called the joy of what?
  6. 14. A social engineering attack where an attacker appears to be someone legitimate to trick you into giving up information.
  7. 17. A company which hackers breached in 2013 and gained access to 40 million credit card numbers.
  8. 19. A group of computers that have a virus installed on them and are controlled by a hacker.
  9. 20. Written defamation
Down
  1. 1. Another name for two-factor authentication
  2. 2. what does the C in CIA stand for?
  3. 3. Malware that encrypts files on your computer and demands payment to decrypt them.
  4. 5. Hacking for a political cause
  5. 7. Devices installed by thieves at places where credit cards are commonly used meant to steal credit card numbers.
  6. 8. Unique biological characters
  7. 11. A piece of software designed to exploit system flaws.
  8. 13. A piece of software that inserts itself into other software.
  9. 15. what does the I in CIA stand for
  10. 16. A bug in OpenSSL in 2012
  11. 18. A virus created to damage centrifuges in Iran.