RU ITEC411 Crime and Security

1234567891011121314151617181920
Across
  1. 2. a piece of software that is designed to fix errors in preexisting software
  2. 4. the use of hacking for a political cause
  3. 10. fake websites that are used to steal personal information
  4. 12. malware that encrypts files on a computer and then demands payment to decrypt the files
  5. 13. biological characteristics that are unique to an individual
  6. 14. this attack overloads a target site with requests for information
  7. 17. malware that monitors and records a user's activity on their device
  8. 18. software that allows future access to a device by bypassing the normal security checks
  9. 20. devices attached to card readers that can collect card numbers and pins
Down
  1. 1. flaws in a system that can be exploited
  2. 2. fraudulent messages that impersonate people or organizations in order to steal the target's information
  3. 3. a group of Internet connected devices infected with malware that communicates with a central host
  4. 5. software that searches for and removes malware on a device
  5. 6. a verbal statement that is false and damaging to one's reputation
  6. 7. a program that copies itself to other computers
  7. 8. malicious software
  8. 9. intentional, unauthorized access to a computer system
  9. 11. In the early days of computing, this would be a creative programmer who wrote clever or elegant code
  10. 15. a written statement that is false and damaging to one's reputation
  11. 16. deceiving users by faking data, usually to make a communication appear to be from a trusted source
  12. 19. software that attaches itself to other software