RU ITEC411- Crime and Security

1234567891011121314151617181920
Across
  1. 4. U.S. law that criminalizes unauthorized computer access.
  2. 6. An attack that overloads and shuts down websites.
  3. 9. Filing lawsuits in countries with stricter defamation laws.
  4. 10. Using hacking to promote a political cause.
  5. 11. Method of encoding data to prevent unauthorized access.
  6. 12. Unauthorized access to computer systems.
  7. 13. Records used to track cybercriminal activities.
  8. 14. Hacking conducted by governments as a strategic weapon.
  9. 18. Voice-based phishing scams.
  10. 19. A system that filters out suspicious network activity.
  11. 20. Crime involving the misuse of personal information.
Down
  1. 1. Investigating digital crimes through data recovery.
  2. 2. A 2013 cyber attack that compromised millions of credit cards.
  3. 3. A decoy system used to attract and study hackers.
  4. 5. Phishing via SMS text messages.
  5. 7. sophisticated worm targeting industrial control systems.
  6. 8. Manipulating people into revealing confidential information.
  7. 15. Fraudulent emails attempting to steal personal data.
  8. 16. Disclosing security flaws for ethical reasons.
  9. 17. Security technology based on physical traits.