RU ITEC411 - Chapter 5

12345678910111213141516171819
Across
  1. 2. What color hat type of hacker uses their skills for criminal or unethical activity?
  2. 4. From the 1970s to 1990s, this meant manipulating a telephone… “phone ______”
  3. 8. The main federal computer crime law in 1984 (abbreviation)
  4. 11. Field of gathering evidence from computers… ______ forensics
  5. 13. What is a tool used to filter and monitor communication?
  6. 14. Using social techniques to trick people into giving up secure information…. “social _______”
  7. 16. A clever piece of code in the 1960s to 70s
  8. 17. What color hat type of hacker uses their skills for good?
  9. 19. Sophisticated program that started in Iran in 2008
Down
  1. 1. What type of hacking is used to promote politics?
  2. 3. Most types of hacking is a form of what?
  3. 4. What act expanded on the Computer Fraud and Abuse Act?
  4. 5. Someone who breaks into computers without access (1970s to 90s)
  5. 6. Under the Computer Fraud and Abuse Act, accessing a computer without authorization is _____
  6. 7. A creative programmer in the 1960s to 70s
  7. 9. Type of theft where someone uses someone else’s namesake… ______ theft
  8. 10. What color hat type of hacker uses their skills for good but publicize vulnerabilities beforehand?
  9. 12. Type of social engineering where someone uses fraudulent spam to gather secure information
  10. 15. What is the abbreviation of an attack used to shut down an online website –
  11. 18. Attractive sites for hackers are called _____ pots