Chapter 05 Part 03

12345678910
Across
  1. 4. What is the least likely use of his botnet?
  2. 5. When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called what?
  3. 6. What is a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
  4. 8. What can be used to create a software registration number, sometimes illegally?
  5. 9. What type of software restricts access to specified websites?
  6. 10. What is the least likely motive for a DDoS?
Down
  1. 1. What system does a new federal laboratory use in its high security areas
  2. 2. What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
  3. 3. What apps can allow you to lock your mobile device and SIM card remotely
  4. 7. What terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?