RU ITEC411 Crime and Security

12345678910111213141516171819
Across
  1. 3. (2 words) a type of hacker who behaves destructively/unethically.
  2. 7. The manipulation of people into violating security protocols.
  3. 8. A cyber attack in which a server or service is overwhelmed with requests.
  4. 10. (2 words) a type of hacker who behaves constructively, improving security and demonstrating vulnerabilities.
  5. 14. Software allowing future access to a machine by bypassing security checks.
  6. 15. Software that attaches to another program. Often replicates.
  7. 17. (2 words) websites/servers meant to be attractive to hackers for study.
  8. 18. Malware that holds your files cryptographically hostage pending payment.
  9. 19. An organization created in response to the Internet Worm incident.
Down
  1. 1. Malware that logs user activities and sends it to a server.
  2. 2. Performing acts of technical expertise; has been used both positively and negatively over time.
  3. 4. (2 words) Malware that appears benign but hides malicious behavior.
  4. 5. Written defamation.
  5. 6. The act of hacking for a political cause.
  6. 9. Verbal defamation
  7. 11. A group of computers with a virus allowing them to cooperate over a server.
  8. 12. Luring users to fake sites for the collection of personal data.
  9. 13. Sending mass messages attempting to steal information.
  10. 16. An independent piece of software that attempts to replicate to nearby vulnerable systems.
  11. 19. An act passed in the 1980s, made it illegal to read/copy federally-involved computer systems.