RU ITEC411 Chapter 5
Across
- 1. a written form of defamation
- 5. the 2010 act that aimed to combat libel tourism
- 10. the act that came after the September 11th attacks that increased surveillance
- 11. acronym for the 1984 act that aimed to combat hacking by punishing people who accessed a computer without proper authorization
- 13. technique attackers use to send people to fake web sites pretending to be the real one to steal personal information
- 17. the concept of hacking with the purpose of a political or social cause
- 18. the action of someone exposing wrongdoing, usually by the government
- 19. word that comes before hat hacker, this type of hacker hacks with good intent to expose vulnerabilities and strengthen a system's security
Down
- 2. this can be used to protect personal information by scrambling it up
- 3. when you receive a text message from a scammer pretending to be a company to steal your personal information
- 4. suppressing or prohibiting something from being shared
- 6. when you receive an email from a scammer pretending to be a company to steal your personal information
- 7. 2008 computer worm that caused damage to Iran's nuclear program
- 8. this retailer was victim to a major security breach in fall of 2013 where over 70 million customer records were stolen
- 9. intellectual property law that gives protection from unauthorized use or distribution and gives ownership to creative works
- 12. physical and behavioral features of a person
- 14. acronym for the organization that manages trade rules globally
- 15. when you receive a phone call from a scammer pretending to be a company to steal your personal information
- 16. a network security feature that restricts and monitors traffic
- 18. type of computer malware that has the ability to spread from computer to computer by itself