RU ITEC411( Crime and Security)

12345678910111213141516171819
Across
  1. 8. Thieves utilize the identity of an ignorant, innocent person in a variety of crimes
  2. 9. utilize their expertise to expose system flaws and enhance security
  3. 13. voice phishing
  4. 15. open access was first implemented as a method of sharing material for study.
  5. 17. methods for stealing financial and personal data
  6. 18. By putting fake U RLs in Domain Name Servers, fake websites that fish for personal and financial information
  7. 19. text messaging
Down
  1. 1. the expansion of mobile and online technologies
  2. 2. Unauthorized use of a computer is prohibited.
  3. 3. a duty to advance with security as a priority
  4. 4. are employed to keep an eye on and block communication from unreliable websites.
  5. 5. e-mail
  6. 6. Publishers are required to stop content or services from being accessed in nations where they are prohibited.
  7. 7. A worm with incredible sophistication
  8. 10. is hacking used to advance a political purpose
  9. 11. biological traits that are specific to an individual
  10. 12. a duty to employ security tools and keep an eye on their networks to thwart attacks
  11. 14. a duty to research the available resources, ask questions, and become knowledgeable about security measures
  12. 16. The expense of defending against an attack was included to the definition of loss under Act.
  13. 18. The excitement of programming