ITS2210 Module 7 Crossword P

1234567891011121314151617181920
Across
  1. 1. This virus is an example of domestic cyber terrorism
  2. 7. This type of loss is the most likely damage to occur in an act of cyber terrorism
  3. 9. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
  4. 12. A political group that has used the internet for political intimidation
  5. 13. This website has been a focus of identity theft criminals to gain access to personal data and pictures
  6. 15. This conflict in 1990 had a cyber warfare component
  7. 17. Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
  8. 18. Hacking conducted for ideological purposes
  9. 19. Accessed to find postings from or about your target
Down
  1. 2. Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
  2. 3. This command shows any shared files that are open
  3. 4. This type of "data" is data relevant to an investigation
  4. 5. Using the Internet to terrorize someone or some group of individuals
  5. 6. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
  6. 8. The process of finding names, addresses, and phone numbers using popular websites like Yahoo
  7. 10. This type of warfare often involves propaganda and disinformation campaigns
  8. 11. The NSA and ______ have allegedly had one of their cyber spies caught
  9. 14. Cyber criminals can use your personal information to guess these
  10. 16. The most popular search engine used to gather personal information
  11. 20. Linux stores these logs at the following location /var/log/mail.*