RU ITEC411 Chapter 5 Crime and Security

1234567891011121314151617
Across
  1. 2. Security system to block unwanted stuff
  2. 4. Scamming people through fake text messages
  3. 5. Scamming people through fake phone calls
  4. 7. Law that makes unauthorized access illegal
  5. 9. Mixing information up so its unable to be read
  6. 11. Fake system to study hackers
  7. 15. Damaging / breaking into a computer network
  8. 16. Providing identification to access
  9. 17. Identifying someone using face scan or fingerprints
Down
  1. 1. Harmful program on your computer
  2. 3. Scamming people through fake emails
  3. 4. Protecting devices from everything
  4. 6. Impersonating someone with their information
  5. 8. Computer program that spreads through devices
  6. 10. Scamming people through fake redirecting websites
  7. 11. Hacking but used for political issues
  8. 12. Investigating computers for evidence for a crime
  9. 13. Breaking into a computer without permission
  10. 14. Stealing money using fake information