RU ITEC411 - Crime and Security

1234567891011121314151617181920
Across
  1. 1. A concealed entry point in communication systems
  2. 3. Enhanced account security using multiple steps(acronym)
  3. 9. This law places restrictive measures on information.
  4. 10. Covert software that gathers user data
  5. 11. Retail corporation affected by a major data breach in 2007.
  6. 13. Legislation protecting intellectual property.
  7. 15. Proving one's identity
  8. 17. A United States federal law that governs unauthorized access to computer systems and data
  9. 18. Deceptive cybersecurity trap for hackers.
  10. 19. Activist use of hacking for social or political causes
  11. 20. This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
  1. 2. False statements harming one's reputation.
  2. 4. False spoken statements harming reputation.
  3. 5. This process transforms information into a coded form to protect it from unauthorized access
  4. 6. Using unique physical features for identification
  5. 7. Malicious software that replicates and infects
  6. 8. system is used in retail to process transactions, record sales, and manage inventory(acronym.
  7. 12. Ethical hacking for security assessment.
  8. 14. Deceptive online tactic to steal personal information
  9. 16. U.S. law for wiretaps and law enforcement access