RU ITEC411- Crime and Security
Across
- 4. Hacking to promote a political cause
- 6. These people developed coding standards for secure software development
- 8. The main federal computer-crime law passed in 1980
- 9. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
- 14. The exchange of goods/services over the internet
- 16. Hackers who use their skills to improve system security
- 17. The process of verifying the identity of a person
- 18. The use of false domains/URLs to steal personal/financial information
- 19. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
Down
- 1. Biological characteristics that are unique to each individual
- 2. Hackers whose activities are destructive
- 3. Software created with the intent to harm computer hardware/software
- 5. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
- 7. A way in which one can transform readable data into an unreadable cypher
- 10. An application is ------ if it has a digital certificate attached to it
- 11. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
- 12. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
- 13. The --------- system controls access to a computer's hardware, applications, and files.
- 15. Ensuring data that should be private remains private