RU ITEC411
Across
- 3. – Deception to gain money or access data illegally.
- 4. – Protecting computers, networks, and data from attacks.
- 6. – Tricking people into visiting fake websites to steal data.
- 10. – Phishing through fake phone calls pretending to be legit.
- 11. Overloading a website or server so it crashes.
- 12. – A super sophisticated cyber weapon that targeted Iran’s nuclear program.
- 14. – A U.S. law that expanded government surveillance after 9/11.
- 15. – Fake systems set up to bait and track hackers.
- 18. – Investigating cybercrimes and tracking down hackers.
- 19. – legal power a country has over online activities.
Down
- 1. – Hacking done for political or social causes.
- 2. – An entity blocking or controlling what people can see online.
- 5. – Any digital assault meant to steal data or cause harm.
- 7. – laws protecting individuals from false information that damages the victim’s reputation.
- 8. – Content that's restricted online for being offensive.
- 9. – Breaking into computer systems, whether for good or bad.
- 13. – Using fingerprints, and other physical traits for security.
- 16. – Tricking people into giving up personal info through fake emails.
- 17. – Phishing but through text messages instead of email.
- 20. – Personal data that cybercriminals want to steal.