Module 7 Puzzle

12345678910111213141516171819
Across
  1. 1. Accessed to find postings from or about your target
  2. 5. This conflict in 1990 had the first known cyber warfare component
  3. 9. The NSA and ______ have allegedly had one of their cyber spies caught in the past
  4. 10. Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
  5. 13. This command shows any shared files that are open
  6. 14. This website is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
  7. 15. This type of warfare often involves propaganda and disinformation campaigns
  8. 17. Modeling language used by systems engineers
  9. 18. The process of finding names, addresses, and phone numbers using popular websites like Yahoo
  10. 19. Using the Internet to terrorize someone or some group of individuals
Down
  1. 2. This matrix is the most appropriate tool for capturing the requirements of any security process or system
  2. 3. This type of diagram shows how any entity might interact with a system
  3. 4. Cyber criminals can use your personal information to guess these
  4. 6. A political group that has used the internet for political intimidation
  5. 7. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
  6. 8. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
  7. 11. This type of "data" is data relevant to an investigation
  8. 12. The most popular search engine used to gather personal information
  9. 16. This website has been a focus of identity theft criminals to gain access to personal data and pictures
  10. 17. Linux stores these logs at the following location /var/log/mail.*