RU ITEC411 - Crime and Security

1234567891011121314151617181920
Across
  1. 3. Fraudulent spam emails to gather information used to impersonate someone, steal money or goods.
  2. 4. Placing false IP address in the tables on a DNS that leads to a counterfeit site for gathering personal data.
  3. 9. Various crimes in which a criminal or group uses the identity of a person.
  4. 10. Ensure systems, services, data are accessible when needed.
  5. 11. An attack in which a botnet overwhelms a system or website with requests that stops users from accessing the system or website.
  6. 12. Malware that monitors and records activities on an electronic device.
  7. 14. Fraudulent spam texts to gather information used to impersonate someone, steal money or goods.
  8. 17. Recording device used to steal credit/debit card information.
  9. 18. Group of electronic devices that have a malware that controls them via a central host that coordinates the army to perform tasks.
  10. 19. Biological characteristics unique to an individual.
Down
  1. 1. Ensure data should be private remain private.
  2. 2. Software that gives access to an electronic device by bypassing security checks.
  3. 5. Manipulation of people to get information or do a task that violates security protocols, two words no spaces.
  4. 6. Malware that asks as a normal software but has malicious abilities hidden.
  5. 7. A system that calculates a customer's bill when checking out and starts payment.
  6. 8. Malware that encrypts files on an electronic devices, then asks for payment to decrypt files.
  7. 13. Software that attaches to a program.
  8. 15. Similar to virus, does not attach itself to other programs.
  9. 16. Use of hacking to promote a political cause.
  10. 20. Ensure data is not changed without authorization, stays consistent over time and stays sync with real world.