RU ITEC411 Chapter 5
Across
- 3. the use of computer hacking for politically or socially motivated purposes
- 5. a cyberattack that uses fake calls to trick people into giving sensitive information
- 6. an act that makes it so that gambling businesses cannot knowingly accept bets/wagers from people over the internet
- 8. an international organization that allows people to buy services from other countries as long as its legal in their own
- 11. Unique physiological or behavioral characteristics that are used to verify the identity of a person
- 12. a software used to prevent/delete viruses from a computer
- 13. a cyberattack that uses fake texts to trick people into giving sensitive information
- 15. a computer worm that targets control systems and was thought to be the cause of the damage to the nuclear program of Iran
- 16. people who are considered cybersecurity professionals who use their skills show system vulnerabilities
- 18. a security barrier that monitors incoming and outgoing network traffic
- 19. a law made to help with national security by creating more government surveillance
Down
- 1. a cyberattack that uses fake emails to trick people into giving sensitive information
- 2. a type of program designed to prevent/find unwanted spyware programs
- 3. a decoy system designed to trap potential attackers
- 4. The act of going to a foreign place with libel laws so the person can sue
- 7. a cyberattack that uses fake websites to trick people into giving sensitive information
- 9. the act of breaking unto digital devices intentionally
- 10. a cyberattack that makes a computer resource unavailable to users by overwhelming it with traffic
- 14. the illegal acquisition and use of a person's identifying information
- 17. a bill passed in the US that fixed the existing computer fraud law