RU ITEC411- Crime and Security
Across
- 4. Software created with the intent to harm computer hardware/software
- 10. Ensuring data that should be private remains private
- 15. Hackers who use their skills to improve system security
- 16. The process of verifying the identity of a person
- 17. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
- 19. Biological characteristics that are unique to each individual
Down
- 1. The main federal computer-crime law passed in 1980
- 2. The exchange of goods/services over the internet
- 3. The --------- system controls access to a computer's hardware, applications, and files.
- 5. A way in which one can transform readable data into an unreadable cypher
- 6. Hackers whose activities are destructive
- 7. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
- 8. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
- 9. These people developed coding standards for secure software development
- 11. The type of theft in which a criminal uses the identity of an unknowing innocent person
- 12. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
- 13. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
- 14. Hacking to promote a political cause
- 17. The use of false domains/URLs to steal personal/financial information
- 18. An application is ------ if it has a digital certificate attached to it