RU ITEC411 Crime and Security

1234567891011121314151617181920
Across
  1. 2. A flaw in a computer program that can be exploited.
  2. 3. A virus that infected 80% of federal agencies and is considered one of the most destructive ones.
  3. 6. Purposefully accessing a computer without permission.
  4. 8. Malware that watches what the user is doing
  5. 9. A group of compromised computers that communicate with a central control server.
  6. 15. What the internet began as; as a collection of universities, government agencies, and companies.
  7. 17. A vulnerability in OpenSSL that allowed attackers to overread a buffer to get information off of systems running the software.
  8. 19. A program that allows an attacker to access a computer without going through the proper access route.
  9. 20. Faking where it looks like communications come from
Down
  1. 1. The act of luring people to a fake website used to collect data.
  2. 4. A malware that requires a ransom to be paid to decrypt the user's data.
  3. 5. A term for phone hacking.
  4. 7. A digital attack used by a nation state.
  5. 10. A type of attack that that impersenates a legitimate person or organization for malicious purposes.
  6. 11. Software that causes harm.
  7. 12. A computer program that puts itself on other computers
  8. 13. Hacking for political purposes.
  9. 14. A peice of software to fix a bug or vulnerability in a computer program.
  10. 16. An acronym for internet connected devices
  11. 18. A type of attack (acronym) that prevents people from accessing computer resources.