RU ITEC411 Ch. 5

1234567891011121314151617181920
Across
  1. 3. When hackers hack without any malicious intent.
  2. 6. Software that duplicate itself and destroys the victim's file.
  3. 9. used Microsoft Word to email copies of the victims contact list.
  4. 13. Back in the day, these programmers were seen to be creative with the way they program.
  5. 14. The crime of using the identity of someone else.
  6. 16. Hackers use this malware to observe and record victims activities, whether on computers or phones.
  7. 17. Hackers use this malware to hold victim's data hostage for the gain of payment from their victims.
  8. 20. A movie that motivated upcoming hackers to hack Defense Department computers.
Down
  1. 1. When victims receive emails leading them to shady sites and inputting personal information on them.
  2. 2. A malware that acts as innocent software but is design for malevolent means.
  3. 4. A book from Clifford Stoll.
  4. 5. Tricks victims into giving out private informtaion and commit actions that goes against protocol.
  5. 7. A computer program in the 1980's that shows the weaknesses of the Internet to hacking.
  6. 8. A worm that was found in the 2000s that spread to over 1 million computers and police body cameras.
  7. 10. Hackers use this to gain access to their victim's system at a later date evading security protocols.
  8. 11. The same as phishing, but with text messaging.
  9. 12. This malware is used by groups of computer devices controlled by the hacker using a center host.
  10. 15. Scans the victim's system for any weaknesses so it can spread to other systems.
  11. 18. When hackers lures victims to fake websites with the goal to collect their personal information.
  12. 19. When websites are overloaded with bots which causes the websites to crash.