RU ITEC411( Crime and Security)
Across
- 8. Thieves utilize the identity of an ignorant, innocent person in a variety of crimes
- 9. utilize their expertise to expose system flaws and enhance security
- 13. voice phishing
- 15. open access was first implemented as a method of sharing material for study.
- 17. methods for stealing financial and personal data
- 18. By putting fake U RLs in Domain Name Servers, fake websites that fish for personal and financial information
- 19. text messaging
Down
- 1. the expansion of mobile and online technologies
- 2. Unauthorized use of a computer is prohibited.
- 3. a duty to advance with security as a priority
- 4. are employed to keep an eye on and block communication from unreliable websites.
- 5. e-mail
- 6. Publishers are required to stop content or services from being accessed in nations where they are prohibited.
- 7. A worm with incredible sophistication
- 10. is hacking used to advance a political purpose
- 11. biological traits that are specific to an individual
- 12. a duty to employ security tools and keep an eye on their networks to thwart attacks
- 14. a duty to research the available resources, ask questions, and become knowledgeable about security measures
- 16. The expense of defending against an attack was included to the definition of loss under Act.
- 18. The excitement of programming