RU ITEC411 Chapter 5

12345678910111213141516171819
Across
  1. 1. a written form of defamation
  2. 5. the 2010 act that aimed to combat libel tourism
  3. 10. the act that came after the September 11th attacks that increased surveillance
  4. 11. acronym for the 1984 act that aimed to combat hacking by punishing people who accessed a computer without proper authorization
  5. 13. technique attackers use to send people to fake web sites pretending to be the real one to steal personal information
  6. 17. the concept of hacking with the purpose of a political or social cause
  7. 18. the action of someone exposing wrongdoing, usually by the government
  8. 19. word that comes before hat hacker, this type of hacker hacks with good intent to expose vulnerabilities and strengthen a system's security
Down
  1. 2. this can be used to protect personal information by scrambling it up
  2. 3. when you receive a text message from a scammer pretending to be a company to steal your personal information
  3. 4. suppressing or prohibiting something from being shared
  4. 6. when you receive an email from a scammer pretending to be a company to steal your personal information
  5. 7. 2008 computer worm that caused damage to Iran's nuclear program
  6. 8. this retailer was victim to a major security breach in fall of 2013 where over 70 million customer records were stolen
  7. 9. intellectual property law that gives protection from unauthorized use or distribution and gives ownership to creative works
  8. 12. physical and behavioral features of a person
  9. 14. acronym for the organization that manages trade rules globally
  10. 15. when you receive a phone call from a scammer pretending to be a company to steal your personal information
  11. 16. a network security feature that restricts and monitors traffic
  12. 18. type of computer malware that has the ability to spread from computer to computer by itself