Across
- 5. The application of investigation and technical analysis to preserve digital evidence that can be used in a court of law.
- 6. This internet attack disrupts computer access to an internet service by sending an influx of confusing data messages or useless traffic to a computer network.
- 9. This cyber-criminal has the malicious intention of destroying data, stealing information or committing another type of crime.
Down
- 1. These attacks play on human error to bypass technical security controls.
- 2. This cyber-criminal is an amateur that uses pre-written hacking and cracking programs to break into computers or networks.
- 3. Programs that act without a user's knowledge and alter operations of computers and mobile devices.
- 4. This cyber-criminal describes someone who enter a computer or network illegally.
- 5. This cyber criminal uses the internet or network to destroy computers for political reasons.
- 7. The ____ web is a portion of the internet that cannot be accessed through regular search engines.
- 8. These controls help reduce the chances of theft and include surveillance cameras, the use of security guards, alarm systems and locking devices.