ITS2210 Module 7 Crossword

1234567891011121314151617181920
Across
  1. 2. This type of loss is the most likely damage to occur in an act of cyber terrorism
  2. 7. Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
  3. 10. Hacking conducted for ideological purposes
  4. 11. Using the Internet to terrorize someone or some group of individuals
  5. 12. Accessed to find postings from or about your target
  6. 14. The most popular search engine used to gather personal information
  7. 15. Cyber criminals can use your personal information to guess these
  8. 19. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
  9. 20. Linux stores these logs at the following location /var/log/mail.*
Down
  1. 1. This virus is an example of domestic cyber terrorism
  2. 3. This command shows any shared files that are open
  3. 4. This type of warfare often involves propaganda and disinformation campaigns
  4. 5. This website has been a focus of identity theft criminals to gain access to personal data and pictures
  5. 6. This type of "data" is data relevant to an investigation
  6. 8. The process of finding names, addresses, and phone numbers using popular websites like Yahoo
  7. 9. A political group that has used the internet for political intimidation
  8. 13. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
  9. 16. Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
  10. 17. This conflict in 1990 had a cyber warfare component
  11. 18. The NSA and ______ have allegedly had one of their cyber spies caught