RU CS411 - Crime and Security

12345678910111213141516171819
Across
  1. 6. Malicious code that encrypts certain files on a computer and demands some payment to release them.
  2. 8. In the early days of computing, a hacker was just a "creative __________."
  3. 9. Type of hacker that is known for exploiting vulnerabilities to improve security.
  4. 12. Malicious code that logs activity on a computer and sends it to a remote server.
  5. 14. Emails that imitate large companies to exploit trust and convince users to click on malicious links.
  6. 16. A common target for identity thefts thanks to their public display of addresses, birth dates, and work histories.
  7. 17. Term with a positive meaning in the 70s that shifted to negative today.
  8. 18. Malicious code that spreads through vulnerabilities across computers.
  9. 19. Convincing people to release potentially sensitive information through manipulative tactics.
Down
  1. 1. Malicious code that provides an alternative access route to a computer that is only known and used by a hacker.
  2. 2. Exploiting DNS servers to plant malicious websites in the place of a common FQDN.
  3. 3. A daylong event for developing innovative new software and hardware.
  4. 4. A group of computer infected by malicious code that causes them to act in response to a hacker's control.
  5. 5. Vladimir _____ stole $400,000 in what is believed to be the first online bank robbery.
  6. 7. Term for manipulating the telephone system, often used to make free calls.
  7. 9. Movie that was inspiration for many young hackers attempting to break in to Department of Defense computers.
  8. 10. Malicious code that acts as a software application.
  9. 11. Retailer whose data was compromised due to a phishing attack on their HVAC provider.
  10. 13. Acronym for an attack that involves overwhelming servers to restrict access for users.
  11. 15. One of the most destructive viruses, affecting Ford, the Pentagon, and the British Parliament, among others.