RU ITEC411-Chapter 5 Crime and Security
Across
- 1. Published false statement that damages someone's reputation
- 4. Self replicating malicious software that spreads through networks automatically
- 6. Highly sophisticated computer worm that targeted Iranian facilities
- 8. Identity theft technique using text messages to obtain financial information
- 10. Security system that monitors and filters network traffic from suspicious sources
- 11. Security incident where unauthorized parties access protected systems or data
- 13. International organization whose members agree on cross-border trade and service rules
- 15. Unauthorized access to computer systems without permission
- 17. Legal term describing unauthorized computer system entry
- 19. Using computer techniques to promote political causes
- 20. Converting data into coded format to protect stolen information from being useful
Down
- 2. Authentication method using unique biological characteristics like fingerprints
- 3. Scientific process of retrieving digital evidence from computers and storage devices
- 5. Fraudulent emails disguised as legitimate communications to steal personal information
- 7. Exposing security flaws or wrongdoing within an organization
- 9. Verifying the identity of users or the legitimacy
- 12. Decoy website set up to attract and study hacker behavior
- 14. Cyber attack using false websites planted in domain name servers to collect data
- 16. Federal law passed in 1984 making unauthorized computer access illegal
- 18. Voice based fraud method where criminals call victims pretending to be legitimate businesses