RU ITEC411 - Crime and Security
Across
- 2. embedded devices connected to the internet
- 4. Malicious software designed to look like something else
- 8. Luring people to fraudulent websites
- 9. Function used to encode information
- 11. Malicious software that monitors user activity
- 12. Hacking to promote a political agenda
- 14. Fraudulent spam
- 17. 1980's Law that governs unauthorized access
- 19. Unique biological characteristics
- 20. Malicious software that exploits vulnerabilities
Down
- 1. A group of compromised devices
- 3. Allows hackers a future way into a system
- 5. Malicious software that encrypts files
- 6. criminal deception or trickery
- 7. Written defamation
- 10. Breaking into gaining unauthorized access (era 2)
- 13. Verbal defamation
- 15. A creative programmer (era 1)
- 16. Malicious software that attaches to programs
- 18. Cyberattack designed to overwhelm services