RU ITEC411- Crime and Security

12345678910111213141516171819
Across
  1. 4. Software created with the intent to harm computer hardware/software
  2. 10. Ensuring data that should be private remains private
  3. 15. Hackers who use their skills to improve system security
  4. 16. The process of verifying the identity of a person
  5. 17. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
  6. 19. Biological characteristics that are unique to each individual
Down
  1. 1. The main federal computer-crime law passed in 1980
  2. 2. The exchange of goods/services over the internet
  3. 3. The --------- system controls access to a computer's hardware, applications, and files.
  4. 5. A way in which one can transform readable data into an unreadable cypher
  5. 6. Hackers whose activities are destructive
  6. 7. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
  7. 8. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
  8. 9. These people developed coding standards for secure software development
  9. 11. The type of theft in which a criminal uses the identity of an unknowing innocent person
  10. 12. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
  11. 13. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
  12. 14. Hacking to promote a political cause
  13. 17. The use of false domains/URLs to steal personal/financial information
  14. 18. An application is ------ if it has a digital certificate attached to it