Chapter 5: Crime & Security

123456789101112131415161718
Across
  1. 2. A virus that encrypts data on a device and demanding a ransom in order to unlock said data
  2. 3. emails convincing victims to use a fake website that appears to be well known
  3. 9. Manipulating people to voilate security protocols
  4. 10. creating fake website to lure uninformed victems in order to steal personal data
  5. 12. malware that attaches or spreads itself to infect other software
  6. 13. process of converting data files into an unreadable code to prevent unauthorized access and viewership
  7. 14. (CFAA)
  8. 15. software that does not attach itself ,created to exploit software/system flaws
  9. 16. Illegal malware that monitors and steals data without the knowledge or consent of an individual
  10. 18. (CERT)developed standards for coding and software development
Down
  1. 1. Illegally breaking into devices and releasing viruses
  2. 4. hacking in order to display support or promote a political cause.
  3. 5. A US&Isreal government collaboration project used to successfully destroy irans nuclear weapons production
  4. 6. (OS),controls access to hardware/software avaible to users
  5. 7. malware that appear to be harmless software
  6. 8. Biological markers of an individual used for identification
  7. 11. Crashing servers by overwhelming data traffic with packets and frames
  8. 17. legally breaking into computer systems/software to test security/software integrity