RU ITEC411 Crime and Security
Across
- 4. An attractive scene for hackers monitored by law enforcement
- 7. Private research that reports flaws in security to an organization to help the organization fix it
- 9. Stealing the ID of a person via personal information, SSN, or financial records
- 11. A person gains unauthorized access to a computer to promote a political cause
- 17. Sending data packets to a host in order to overwhelm the host's resources
- 18. Used to filter and monitor ports from unwanted activity
- 19. Selling goods online instead of in stores
- 20. Someone who exposes a secret in an organization
Down
- 1. Countries that allow citizens in one country to buy certain services in another country if the service is illegal in their country
- 2. Authentication using fingerprint, retina scan, or anything on the body
- 3. Creating a legitimate looking email to trick people into giving information
- 5. Creating a fake website to get information using DNS poisoning
- 6. Allowed the sharing of information between agencies and allowed more power to agencies to surveil
- 8. Application used to remove malicious programs
- 10. The analyis of evidence in cyberspace
- 12. Famous worm that came out in 2008 and damaged a uranium plant in Iran
- 13. Is one of the first pieces of legislation that makes it illegal to gain access to a computer without authorization
- 14. legally binding contract that is signed by a user to access a service
- 15. A type of hacker that hacks to show vulnerabilities in a system without malicious intent
- 16. Gaining unauthorized access to a computer system