RU ITEC411 Crime and Security

1234567891011121314151617181920
Across
  1. 2. a time when unauthorized user get access to a system
  2. 8. a program that helps protect you against virus's and malware
  3. 10. a way to identify a person based on physical characteristics like fingerprints
  4. 11. a type of malware that sits in the background on a computer and spys on the user
  5. 13. the way a computer converts hostname to ip address
  6. 15. a type of malware that encrypts some amount of files on your computer then demands payment to decrypt them
  7. 16. an digital attack on a computer or system
  8. 18. weaknesses or weak points that can be exploited
  9. 19. a way people steal credit card info with a physical device
  10. 20. a type of malware that lets attackers us a lot of personal devices to attack someone
Down
  1. 1. a type of malware that lets attackers back in to a system after they have put it in
  2. 3. hacking for political causes
  3. 4. security for computers
  4. 5. fake messages that look real to steal info like login info
  5. 6. software that is malicious
  6. 7. a type of malware that can self replicate and spread
  7. 9. a type of malware that looks and acts like a normal program but includes additional malicious code
  8. 12. a way of protecting data by obscuring it
  9. 14. people who hack into computers and do harm
  10. 17. the base system upon which all other software run