RU ITEC11 Chapter 5

1234567891011121314151617
Across
  1. 2. to ask questions, research questions and to know about security measures
  2. 4. using someone else identity without being authorized and using it for criminal activities
  3. 8. obtain sensitive information as in text messages
  4. 9. creating a fake website to get into personal information by creating a fake url into a domain Name servers
  5. 10. use security tools and monitor networks to avoid attacks
  6. 11. open access was first implemented to share study materials.
  7. 12. obtain sensitive information as in e-mail
  8. 13. is an extremely sophisticated worm
  9. 14. monitor and block communication from unreliable websites.
  10. 15. prohibited use of a computer unless authorized
  11. 16. obtain sensitive information as in voice phishing
  12. 17. techniques on how to steal personal and financial data
Down
  1. 1. prioritize security in their advancements
  2. 2. involves hacking for political purposes
  3. 3. publishers must prevent access towards other nations when it is prohibited
  4. 5. The cost of defending an attack is included in the definition of loss under the Act
  5. 6. traits that are specific to an individual biologically
  6. 7. using someone else identity without being authorized and using it for criminal activities
  7. 9. Programming's excitement
  8. 12. is the expansion of online and mobile technologies