Across
- 3. subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
- 4. EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
- 6. Cyber ------ is use of the Internet or other electronic means to track someone
- 7. The International Organization for ------- is referred as ISO
- 9. EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
- 10. GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
- 11. is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
- 1. PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
- 2. Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
- 4. The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
- 5. refers to the use of a computer to commit a crime
- 8. is the legal process by which an arbiter or judge reviews evidence and argumentation.