RU ITEC411 Crime and Security

1234567891011121314151617181920
Across
  1. 4. An attractive scene for hackers monitored by law enforcement
  2. 7. Private research that reports flaws in security to an organization to help the organization fix it
  3. 9. Stealing the ID of a person via personal information, SSN, or financial records
  4. 11. A person gains unauthorized access to a computer to promote a political cause
  5. 17. Sending data packets to a host in order to overwhelm the host's resources
  6. 18. Used to filter and monitor ports from unwanted activity
  7. 19. Selling goods online instead of in stores
  8. 20. Someone who exposes a secret in an organization
Down
  1. 1. Countries that allow citizens in one country to buy certain services in another country if the service is illegal in their country
  2. 2. Authentication using fingerprint, retina scan, or anything on the body
  3. 3. Creating a legitimate looking email to trick people into giving information
  4. 5. Creating a fake website to get information using DNS poisoning
  5. 6. Allowed the sharing of information between agencies and allowed more power to agencies to surveil
  6. 8. Application used to remove malicious programs
  7. 10. The analyis of evidence in cyberspace
  8. 12. Famous worm that came out in 2008 and damaged a uranium plant in Iran
  9. 13. Is one of the first pieces of legislation that makes it illegal to gain access to a computer without authorization
  10. 14. legally binding contract that is signed by a user to access a service
  11. 15. A type of hacker that hacks to show vulnerabilities in a system without malicious intent
  12. 16. Gaining unauthorized access to a computer system