RU ITEC411 - Chapter 5
Across
- 2. What color hat type of hacker uses their skills for criminal or unethical activity?
- 4. From the 1970s to 1990s, this meant manipulating a telephone… “phone ______”
- 8. The main federal computer crime law in 1984 (abbreviation)
- 11. Field of gathering evidence from computers… ______ forensics
- 13. What is a tool used to filter and monitor communication?
- 14. Using social techniques to trick people into giving up secure information…. “social _______”
- 16. A clever piece of code in the 1960s to 70s
- 17. What color hat type of hacker uses their skills for good?
- 19. Sophisticated program that started in Iran in 2008
Down
- 1. What type of hacking is used to promote politics?
- 3. Most types of hacking is a form of what?
- 4. What act expanded on the Computer Fraud and Abuse Act?
- 5. Someone who breaks into computers without access (1970s to 90s)
- 6. Under the Computer Fraud and Abuse Act, accessing a computer without authorization is _____
- 7. A creative programmer in the 1960s to 70s
- 9. Type of theft where someone uses someone else’s namesake… ______ theft
- 10. What color hat type of hacker uses their skills for good but publicize vulnerabilities beforehand?
- 12. Type of social engineering where someone uses fraudulent spam to gather secure information
- 15. What is the abbreviation of an attack used to shut down an online website –
- 18. Attractive sites for hackers are called _____ pots