RU ITEC411 Crime

12345678910111213141516171819202122
Across
  1. 4. someone who uses technical skills to explore, access, or break into computer systems
  2. 5. fake emails that try to fool you into clicking links or sharing login information
  3. 7. scrambling data so only someone with the right key can read it
  4. 8. malicious code that attaches to programs and spreads when those programs run
  5. 11. tricking people into giving up passwords or sensitive information
  6. 13. a security professional who uses hacking skills to test and improve defenses
  7. 17. an attack that floods a site or server with traffic so real users can’t reach it
  8. 19. any harmful software designed to damage systems, steal data, or cause problems
  9. 20. using hacking skills to make a political point or support a cause
  10. 21. a self-spreading program that moves across computers on its own and can clog networks
  11. 22. written statements that falsely harm someone’s reputation
Down
  1. 1. the main U.S. law that makes unauthorized computer access a crime
  2. 2. when someone steals personal information to pretend to be someone else
  3. 3. redirecting a user to a fake website even when they typed the real one
  4. 6. text message scams that ask for personal or financial information
  5. 9. a malicious hacker who breaks into systems for theft, disruption, or profit
  6. 10. a group of infected computers secretly controlled by an attacker
  7. 12. investigating digital evidence to figure out what happened in a cyber incident
  8. 14. getting into a computer system without permission, usually by finding weaknesses to exploit
  9. 15. identification using physical traits like fingerprints, face, or iris patterns
  10. 16. technology that figures out a user’s real-world location based on Internet data
  11. 18. phone calls pretending to be from a real company to steal account details