RU ITEC411 Crime and Security
Across
- 2. A verbal form of defamation
- 6. One of the three principles of the CIA triad
- 7. One of the three principles of the CIA triad
- 13. A group of computers infected with malware controlled by a host
- 15. One of the three principles of the CIA triad
- 16. Software that can replicate itself and does not need to be activated
- 17. Hacking for political motivation
- 18. A way of protecting data through scrambling text
- 19. A written form of defamation
Down
- 1. directing people to fake websites to collect personal data
- 3. Software that can replicate itself but needs to be activated
- 4. Physical characteristics used to secure data
- 5. The act of protecting computer systems
- 8. Malicious code that looks to be harmless
- 9. Gaining access to a computer or system without permission
- 10. Act of sending emails in order to gain someone's personal information
- 11. A type a malware that records activities on a computer
- 12. Recording devices that are installed in card readers
- 13. A method used to get around normal security measures
- 14. A type of malware that locks a computer until money is paid