RU ITEC411-Crime and Security
Across
- 3. gaining unauthorized access to data in a system or computer
- 4. software that allow future access to a computer system by bypassing the normal layers of security.
- 7. can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
- 9. biological characteristics unique to an individual
- 12. criminal activity that involves the use of a computer r a network
- 13. person that uses their technical knowledge to break into a computer system or network by no standard means.
- 14. irrelevant or inappropriate messages sent in bulk to recepients
- 16. malware that can monitor or record victim's activities on a computer or mobile phone
- 18. group of internet connected devices each of which runs one or more bots.
- 19. use of computers or computer network techniques such as hacking to promote political agenda
- 22. the assurance that private data will remain private
Down
- 1. sending fraudulent text messages on purpose appearing to come from reputable and legit companies
- 2. the assurance that data will not change without authorization
- 5. malware that blocks access to data or threatens to publish it unless a ransom is paid.
- 6. recording devices inside credit card readers to collect credit card numbers and PINs.
- 8. converting information into secret code that hides the meaning of the information
- 10. protection of computer systems and networks from information theft or hardware damage.
- 11. the way in which thieves collect personal data by luring the victims to fake websites
- 15. sending deceiving emails in order to obtain sensitive personal information from the victim
- 17. malicious computer worm that targets a specific type of control system
- 20. software designed intentionally to be intrusive and destructive to a computer or network
- 21. software that attaches itself to other software and spreads when someone runs an infected program.