RU ITEC411 Crime and Security

123456789101112131415161718192021
Across
  1. 3. Spreads by infected software files, but don't worry, humans can't get this sickness.
  2. 4. The art of hiding information so that only those who know the key can read it.
  3. 6. Face ID, fingerprints, and voice ID are all examples or this type of security.
  4. 9. The name came from the plan of Greek hero Odysseus involved infiltrating Troy's strong walls by hiding soldiers inside a giant, hollow wooden horse.
  5. 12. A network of compromised computers or devices, infected with malware and controlled remotely by a cybercriminal.
  6. 15. Microsoft windows, Mac, and Linux are all examples of this.
  7. 16. A portmanteau for hacking and activism.
  8. 17. The abbreviated name for the law that allows law enforcement to intercept telephone calls.
  9. 18. Recording devices attached to point of sales systems to steal credit card information.
  10. 20. A term used to describe a benevolent hacker.
  11. 21. WWW stands for:
Down
  1. 1. Acting like a hacker to find vulnerabilities in a system or network
  2. 2. the act of keeping sensitive information to yourself
  3. 5. An incident involving a worm led to the creation of this organization (abbreviated).
  4. 7. The Heartbleed bug targeted a vulnerability in this software.
  5. 8. The act of tricking someone into revealing sensitive information.
  6. 10. The field of computer science dedicated to securing computers and preventing cyber attacks.
  7. 11. A type of computer attack that involves using email to trick the user into giving away private information.
  8. 13. Proving someone is who they say they are.
  9. 14. Original name for a sophisticated programmer.
  10. 19. The I of the CIA triad