RU ITEC411 Chapter 5 Crime and Security
Across
- 2. Early packet switching network, seen as the predecessor for modern internet.
- 3. Software intentionally designed to cause disruption.
- 4. Use of cyber-attacks against a state, causing comparable harm to warfare.
- 7. A destructive computer worm that spread rapidly through email attachments.
- 9. Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
- 10. Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
- 14. Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
- 18. A short-range wireless technology that allows electronic devices to communicate.
- 20. Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
- 1. Ethical hacking of a computer system to evaluate security weaknesses and address them.
- 3. A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
- 5. Use of computer hacking to promote political agenda or social change.
- 6. A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
- 8. An open-source library that provides secure communication between computer networks.
- 11. A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
- 12. A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
- 13. Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
- 15. Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
- 16. Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
- 17. Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
- 19. Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.