RU ITEC411: Crime and Security.
Across
- 2. Traveling to sue under strict libel laws in certain countries.
- 4. Malicious software designed to gather user information without consent.
- 5. The process of encoding information to prevent unauthorized access.
- 6. Denial-of-service attack that disrupts online services.
- 11. The use of someone else's personal information for fraud
- 13. A security tool used to filter and monitor network traffic.
- 14. Using hacking to promote a political cause.
- 16. Phishing attacks carried out via voice calls.
- 17. Fraudulent attempts to obtain sensitive information via email.
- 18. Hackers who improve system security by identifying vulnerabilities.
- 19. A security tool to lure and study hackers.
Down
- 1. Security measures using unique biological characteristics
- 3. Measures taken to protect computer systems from cyber attacks.
- 4. A sophisticated worm that targeted Iranian nuclear facilities
- 7. Manipulating individuals to divulge confidential information.
- 8. An organization that addresses trade agreements, including cross-border digital issues.
- 9. Phishing attacks carried out via SMS.
- 10. The Computer Fraud and Abuse Act that criminalizes unauthorized computer access.
- 12. Unauthorized access to or manipulation of computer systems.
- 15. Redirecting users to fraudulent websites to steal personal data.