RU ITEC411:Chapter 5 Crime & Security

1234567891011121314151617181920
Across
  1. 2. (CERT)/developed coding standards for secure software development
  2. 4. breaking into computer Systems and releases viruses
  3. 6. attempting to gain access to an information system to violate the integrity of the system or its services
  4. 7. A US&Israel government collaboration project that successfully destroyed Irans nucleal weapons production
  5. 8. malware that encrypts files on a computer/device and displays a message demanding payment
  6. 11. Using hacking to promote a political cause
  7. 13. does not attach itself, designed to exploit specific software system flaws.
  8. 14. software controls access to the hardware and makes apps/files available to users
  9. 15. The beginning of the internet ,linking together a number of universities, tech companies and government installations
  10. 16. overwhelming servers with packets and frames causing slowdowns and server crashes
  11. 17. software that attaches or adds itself to other software
  12. 18. malware that can monitor and record user activities on a computer or mobile device
  13. 19. software that allows access to a computer system or device by bypassing layers of security checks
  14. 20. luring people to fake websites where thieves collect personal data
Down
  1. 1. CFAA
  2. 3. Messages that tells victim to click on a link to a seemingly well known company website in order to steal information or install viruses
  3. 5. the process of converting information or data into a code, especially to prevent unauthorized access.
  4. 9. biological characteristics that are unique to an individual
  5. 10. malware that appears to be a benign software application.
  6. 12. The manipulation of people into performing a task that violates security protocols