RU ITEC411 Crime and security

1234567891011121314151617181920
Across
  1. 5. Planting false URLs in Domain Name Servers to fish for information
  2. 7. Security flaws in systems caused by factors like poorly written software
  3. 10. Restriction of specific content which varies by country
  4. 13. Tool used to monitor and filter out communication from untrusted sites
  5. 15. Method to securely store data so it is useless if stolen
  6. 16. Use of hacking to promote a political cause
  7. 18. Personal data used by criminals to impersonate innocent people
  8. 19. Malicious code that can be spread rapidly across the Web
  9. 20. Personal and financial information requests disguised as legitimate business email
Down
  1. 1. Act of reporting internal wrongdoings
  2. 2. Intentional, unauthorized access to computer systems
  3. 3. software that can spread rapidly over the Web
  4. 4. Biological characteristics unique to an individual used for high-security
  5. 6. Process of verifying identity to prevent use of stolen data
  6. 8. Sophisticated worm that damaged equipment in a uranium enrichment plant
  7. 9. Breaking into telephone systems Worm
  8. 11. Identity theft or information gathering conducted via text messaging
  9. 12. System security hole that can be exploited
  10. 14. Illegal activities involving computers like credit card theft
  11. 17. Form of phishing conducted via voice calls