CS 102 Lecture 5 Crossword Puzzle

123456789
Across
  1. 5. The application of investigation and technical analysis to preserve digital evidence that can be used in a court of law.
  2. 6. This internet attack disrupts computer access to an internet service by sending an influx of confusing data messages or useless traffic to a computer network.
  3. 9. This cyber-criminal has the malicious intention of destroying data, stealing information or committing another type of crime.
Down
  1. 1. These attacks play on human error to bypass technical security controls.
  2. 2. This cyber-criminal is an amateur that uses pre-written hacking and cracking programs to break into computers or networks.
  3. 3. Programs that act without a user's knowledge and alter operations of computers and mobile devices.
  4. 4. This cyber-criminal describes someone who enter a computer or network illegally.
  5. 5. This cyber criminal uses the internet or network to destroy computers for political reasons.
  6. 7. The ____ web is a portion of the internet that cannot be accessed through regular search engines.
  7. 8. These controls help reduce the chances of theft and include surveillance cameras, the use of security guards, alarm systems and locking devices.