RU ITEC411 Crime and Security

123456789101112131415161718
Across
  1. 2. a group of compromised devices that have a singular central host
  2. 4. ensuring data is not changed unintentionally and is consistent
  3. 7. malware that secretly monitors activity on a device
  4. 8. things such as fingerprints, retina patterns, DNA
  5. 10. abbreviation for the Act that requires the design of telecommunications equipment to allow the gov't to intercept phonecalls
  6. 13. broad term for things such as a virus, worm, trojan horse, etc.
  7. 14. hackers with good intentions
  8. 15. software that allows access to a device bypassing security
  9. 16. malware that attaches to another software
  10. 18. fraudulent spam that arrives via text message
Down
  1. 1. use of hacking to promote a particular political agenda
  2. 3. verifying someone or something is what they claim to be
  3. 5. opposite of decryption
  4. 6. malware that removes access to files on a computer and demands payment to return access
  5. 8. hackers with malicious intent
  6. 9. tricking people into giving you information accidentally/unknowingly
  7. 11. software designed to fix a bug
  8. 12. fradulent spam that takes place via email
  9. 14. malware that does not need to attach to another software and spreads like a disease
  10. 17. abbreviation for attack in which hackers take down a service with excessive requests