RU ITEC411 - chapter 5
Across
- 5. Breaking into computer systems without permission.
- 7. Sending an accused criminal to another country to face charges.
- 11. Scrambling information so only authorized people can read it.
- 13. Investigating crimes by examining digital evidence from computers.
- 15. Sending people to fake websites by corrupting internet.
- 16. Using body features like fingerprints or eye patterns to verify someone's identity.
- 18. Harmful computer programs created to damage systems or steal data.
- 19. Tricking people into revealing passwords or confidential information.
- 20. A hijacked computer secretly controlled by criminals without the owner knowing.
Down
- 1. Hidden device that steals credit card data when cards are swiped.
- 2. Pretending to be someone else to steal money or commit crimes.
- 3. Illegally hacking into phone systems.
- 4. Phone call scams where criminals pretend to be legitimate companies.
- 6. Breaking into computer systems to make a political or social statement.
- 8. Infectious computer code that damages files and spread to other machines.
- 9. Protective barrier that keeps hackers out of computer networks.
- 10. Fake emails that trick people into giving away their personal information.
- 12. Self-replicating computer program that spreads to other machines.
- 14. Publishing false statements that harm someone's reputation.
- 17. Text message scams designed to steal personal information.