RU ITEC411- Crime and Security
Across
- 4. U.S. law that criminalizes unauthorized computer access.
- 6. An attack that overloads and shuts down websites.
- 9. Filing lawsuits in countries with stricter defamation laws.
- 10. Using hacking to promote a political cause.
- 11. Method of encoding data to prevent unauthorized access.
- 12. Unauthorized access to computer systems.
- 13. Records used to track cybercriminal activities.
- 14. Hacking conducted by governments as a strategic weapon.
- 18. Voice-based phishing scams.
- 19. A system that filters out suspicious network activity.
- 20. Crime involving the misuse of personal information.
Down
- 1. Investigating digital crimes through data recovery.
- 2. A 2013 cyber attack that compromised millions of credit cards.
- 3. A decoy system used to attract and study hackers.
- 5. Phishing via SMS text messages.
- 7. sophisticated worm targeting industrial control systems.
- 8. Manipulating people into revealing confidential information.
- 15. Fraudulent emails attempting to steal personal data.
- 16. Disclosing security flaws for ethical reasons.
- 17. Security technology based on physical traits.