ITS2210 Module 7 Crossword

12345678910
Across
  1. 5. This type of warfare often involves propaganda and disinformation campaigns
  2. 8. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
  3. 9. The NSA and ______ have allegedly had one of their cyber spies caught
  4. 10. Using the Internet to terrorize someone or some group of individuals
Down
  1. 1. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
  2. 2. This type of loss is the most likely damage to occur in an act of cyber terrorism
  3. 3. This conflict in 1990 had a cyber warfare component
  4. 4. A political group that has used the internet for political intimidation
  5. 6. This virus is an example of domestic cyber terrorism
  6. 7. Hacking conducted for ideological purposes