RU ITEC411 Crime and Security

1234567891011121314151617181920
Across
  1. 2. Deceptive computer program that appears to be legit.
  2. 4. Ensures that only authorized users can access certain data or resources while maintaining privacy, and preventing data breaches.
  3. 7. Manipulation of individuals into divulging confidential information.
  4. 8. A network of computers used to perform malicious activities.
  5. 11. A weakness in a computer system, or network that can be exploited.
  6. 13. Type of attack where attackers overwhelm a target system or network.
  7. 17. Redirecting legitimate website traffic to fake websites without the user's knowledge.
  8. 18. Type of malware that holds a user's files hostage and demands something in return.
  9. 19. A hidden entry point into a computer system, usually created by the developer.
  10. 20. A malicious software program that self-replicates without human intervention.
Down
  1. 1. A company that provides users with access to the internet.
  2. 3. Authorized users can access information or services whenever needed.
  3. 5. Using hacking to promote a political cause.
  4. 6. Disguising communication from an unknown source.For example, forging senders email address.
  5. 9. Requires users to provide multiple forms of identification before gaining access to a system.
  6. 10. Process of converting plaintext data into ciphertext to secure from unauthorized access.
  7. 12. The assurance that data remains accurate, consistent, and unaltered.
  8. 14. A malicious software program that replicates itself with human intervention.
  9. 15. Attackers impersonate trustworthy entities, usually through emails.
  10. 16. Malicious software that secretly monitors a user's activity.