CYBERCRIME

1234567891011121314151617181920212223242526272829303132333435363738394041
Across
  1. 4. A politically- or ideologically-motivated cyber attack or hack.
  2. 6. A way to access electonic system by bypassing some or all security mechanisms.
  3. 8. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  4. 10. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  5. 12. Malicious software, such as a virus or worm, that attacks a target computer.
  6. 13. The overaching program that runs all the functions on a computer or other electronic device.
  7. 14. A company that offers access the internet.
  8. 15. A camera connectee to computer l, generally used to then stream videos to the internet.
  9. 20. Resource to be accessed, often expressed as a time period.
  10. 21. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  11. 22. The process ofnusing a
  12. 28. Determining the identity or location of an attacker or an attacker's intermediary.
  13. 29. The interdependent network of information technology, infrastructures that includes internet.
  14. 30. Hardware or software designed to prevent unathorized users from accessing a computer system.
  15. 32. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  16. 34. A network point that acts an entrance to another network
  17. 35. A unique internet identifier registered
  18. 36. An online journal.
  19. 39. A program used to access the internet.
  20. 40. Assurance that remains private and no one sees it except for those expected to see it.
  21. 41. A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
  1. 1. Attempting to mimic an official email from a trusted organization to lire individuals.
  2. 2. Refer to someone who gains access to a system, software, or hardware without permission.
  3. 3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. 5. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  5. 7. Are a botnet of comprised hosts, controlled by a single intentity.
  6. 9. A unique internet identifier registered to an entity.
  7. 11. An information packet sent from website to a web browser that records a user's activity on the website.
  8. 16. algorithm against data to produce a numeric value that is representative that data.
  9. 17. Stands for "Wireless Fidelity".
  10. 18. A software robot that performs automated tasks.
  11. 19. The act of one individual harrasing or intimidating another individual via the interner.
  12. 23. Unsolicited advertising or other information sent out via email or other messaging service.
  13. 24. A massed data that is used to describe large amounts of other internet data.
  14. 25. A grou of computers that is linked to share data and othe information.
  15. 26. A website that finds information across the Internet based on a set of search criteria.
  16. 27. an entity.
  17. 31. A network security measure in which information is encoded or scrambled prior to transmission.
  18. 33. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  19. 37. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. 38. Aim to overwhelm the resources of a targeted system to crash that system.