Across
- 4. What is the least likely use of his botnet?
- 5. When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called what?
- 6. What is a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
- 8. What can be used to create a software registration number, sometimes illegally?
- 9. What type of software restricts access to specified websites?
- 10. What is the least likely motive for a DDoS?
Down
- 1. What system does a new federal laboratory use in its high security areas
- 2. What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
- 3. What apps can allow you to lock your mobile device and SIM card remotely
- 7. What terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
