RU ITEC411 Crime and Security
Across
- 3. Spreads by infected software files, but don't worry, humans can't get this sickness.
- 4. The art of hiding information so that only those who know the key can read it.
- 6. Face ID, fingerprints, and voice ID are all examples or this type of security.
- 9. The name came from the plan of Greek hero Odysseus involved infiltrating Troy's strong walls by hiding soldiers inside a giant, hollow wooden horse.
- 12. A network of compromised computers or devices, infected with malware and controlled remotely by a cybercriminal.
- 15. Microsoft windows, Mac, and Linux are all examples of this.
- 16. A portmanteau for hacking and activism.
- 17. The abbreviated name for the law that allows law enforcement to intercept telephone calls.
- 18. Recording devices attached to point of sales systems to steal credit card information.
- 20. A term used to describe a benevolent hacker.
- 21. WWW stands for:
Down
- 1. Acting like a hacker to find vulnerabilities in a system or network
- 2. the act of keeping sensitive information to yourself
- 5. An incident involving a worm led to the creation of this organization (abbreviated).
- 7. The Heartbleed bug targeted a vulnerability in this software.
- 8. The act of tricking someone into revealing sensitive information.
- 10. The field of computer science dedicated to securing computers and preventing cyber attacks.
- 11. A type of computer attack that involves using email to trick the user into giving away private information.
- 13. Proving someone is who they say they are.
- 14. Original name for a sophisticated programmer.
- 19. The I of the CIA triad