RU ITEC411

1234567891011121314151617181920
Across
  1. 3. – Deception to gain money or access data illegally.
  2. 4. – Protecting computers, networks, and data from attacks.
  3. 6. – Tricking people into visiting fake websites to steal data.
  4. 10. – Phishing through fake phone calls pretending to be legit.
  5. 11. Overloading a website or server so it crashes.
  6. 12. – A super sophisticated cyber weapon that targeted Iran’s nuclear program.
  7. 14. – A U.S. law that expanded government surveillance after 9/11.
  8. 15. – Fake systems set up to bait and track hackers.
  9. 18. – Investigating cybercrimes and tracking down hackers.
  10. 19. – legal power a country has over online activities.
Down
  1. 1. – Hacking done for political or social causes.
  2. 2. – An entity blocking or controlling what people can see online.
  3. 5. – Any digital assault meant to steal data or cause harm.
  4. 7. – laws protecting individuals from false information that damages the victim’s reputation.
  5. 8. – Content that's restricted online for being offensive.
  6. 9. – Breaking into computer systems, whether for good or bad.
  7. 13. – Using fingerprints, and other physical traits for security.
  8. 16. – Tricking people into giving up personal info through fake emails.
  9. 17. – Phishing but through text messages instead of email.
  10. 20. – Personal data that cybercriminals want to steal.