RU ITEC411- Crime and Security

1234567891011121314151617181920
Across
  1. 3. Software that build on to another software.
  2. 5. Utilizing cyberattacks for acts of war
  3. 6. Manipulating people to release personal information.
  4. 7. A collection of computers on the internet that have malware that transmits to a central host owned by a hacker
  5. 8. biological characteristics that are different for each individual.
  6. 10. Created by a Cornell University grad student who released it on the internet
  7. 12. A hacker whose intentions are malicious and unethical.
  8. 13. software that does not need to build on to another software to carry out its function.
  9. 16. Malware that takes note of user activities on the users device or machine.
  10. 17. Stealing a person's social security number, drivers license number, or phone number.
  11. 19. Multiple step login process
  12. 20. Malware that seizes all files and prompts the user a message demanding a request in order to have the files released.
Down
  1. 1. Attracting users to false websites where people collect their personal data
  2. 2. searching for weaknesses and vulnerabilities in a system for your organization
  3. 4. A hacker that helps improve security and finds system vulnerabilities for a good cause.
  4. 9. Microsoft windows, macOS, and linux are examples of an
  5. 11. A person who purposefully releases computer viruses and gets into computer systems without permission.
  6. 14. Under this law it is illegal to enter a device without autherization
  7. 15. Fake spam emails pretending to be from an important organization, including a false link for a user to click.
  8. 18. Malware that seems to be safe but actually is malicous