RU ITEC411 CH5
Across
- 5. someone who uses a variety of tactics to gain unauthorized access to computer systems
- 6. Scans your computer to prevent anything that can be identified as a virus from running
- 8. A law introduced after 9/11
- 11. a virus that would spread and operate automatically
- 13. crimes related to using someone else's identity
- 14. A personalized and targeted phishing attack
- 16. determine what packets come in and leave the network
- 17. an attack meant to shut down a service
- 18. Originally someone who wrote creative and elegant code
- 19. a hackers who uses their skills to expose vulnerabilities and make systems safer
- 20. 40 mil credit cards stolen after phishing email sent to them
Down
- 1. biological characteristics of an individual that finger prints the user
- 2. A hole in a systems security
- 3. sending emails in hopes the target falls for a scam
- 4. A law that criminalizes computer fraud and abuse
- 7. The most common target for hacking
- 8. creating a false version of a website to collect user data
- 9. Prevents the installation of spyware
- 10. a worm that damages a Iranian uranium enrichment plant
- 11. A person who exposes a person's or organization's amoral activity
- 12. impersonating someone's voice to scam people
- 15. To hack someone in response to political platform