RU ITEC411 CH5

1234567891011121314151617181920
Across
  1. 5. someone who uses a variety of tactics to gain unauthorized access to computer systems
  2. 6. Scans your computer to prevent anything that can be identified as a virus from running
  3. 8. A law introduced after 9/11
  4. 11. a virus that would spread and operate automatically
  5. 13. crimes related to using someone else's identity
  6. 14. A personalized and targeted phishing attack
  7. 16. determine what packets come in and leave the network
  8. 17. an attack meant to shut down a service
  9. 18. Originally someone who wrote creative and elegant code
  10. 19. a hackers who uses their skills to expose vulnerabilities and make systems safer
  11. 20. 40 mil credit cards stolen after phishing email sent to them
Down
  1. 1. biological characteristics of an individual that finger prints the user
  2. 2. A hole in a systems security
  3. 3. sending emails in hopes the target falls for a scam
  4. 4. A law that criminalizes computer fraud and abuse
  5. 7. The most common target for hacking
  6. 8. creating a false version of a website to collect user data
  7. 9. Prevents the installation of spyware
  8. 10. a worm that damages a Iranian uranium enrichment plant
  9. 11. A person who exposes a person's or organization's amoral activity
  10. 12. impersonating someone's voice to scam people
  11. 15. To hack someone in response to political platform