RU ITEC411 - chapter 5

1234567891011121314151617181920
Across
  1. 5. Breaking into computer systems without permission.
  2. 7. Sending an accused criminal to another country to face charges.
  3. 11. Scrambling information so only authorized people can read it.
  4. 13. Investigating crimes by examining digital evidence from computers.
  5. 15. Sending people to fake websites by corrupting internet.
  6. 16. Using body features like fingerprints or eye patterns to verify someone's identity.
  7. 18. Harmful computer programs created to damage systems or steal data.
  8. 19. Tricking people into revealing passwords or confidential information.
  9. 20. A hijacked computer secretly controlled by criminals without the owner knowing.
Down
  1. 1. Hidden device that steals credit card data when cards are swiped.
  2. 2. Pretending to be someone else to steal money or commit crimes.
  3. 3. Illegally hacking into phone systems.
  4. 4. Phone call scams where criminals pretend to be legitimate companies.
  5. 6. Breaking into computer systems to make a political or social statement.
  6. 8. Infectious computer code that damages files and spread to other machines.
  7. 9. Protective barrier that keeps hackers out of computer networks.
  8. 10. Fake emails that trick people into giving away their personal information.
  9. 12. Self-replicating computer program that spreads to other machines.
  10. 14. Publishing false statements that harm someone's reputation.
  11. 17. Text message scams designed to steal personal information.