RU ITEC 411 - Chapter 5

1234567891011121314151617181920
Across
  1. 4. organization responsible for the development of secure coding standards
  2. 8. computer virus circa 2000 causing billions in damages
  3. 9. 17 down is a type of this
  4. 10. hackers may use resumes from job postings to commit this crime
  5. 14. technology for encrypted payment method using a cell phone
  6. 16. device that records and steals credit card numbers from readers
  7. 18. 2000's act that broadened the scope of 6 down
  8. 19. a vulnerability in a system designed intentionally to attrack criminals
  9. 20. open source encryption software
Down
  1. 1. hacking a mobile phone to circumvent certificate requirements
  2. 2. technology that makes technologies such as the iPhone impossible to crack
  3. 3. hacking for a cause
  4. 5. name of the malware used to attack 11 Down
  5. 6. the first major U.S. computer crime law, passed in the 1980's
  6. 7. a hidden means of accessing a computer
  7. 11. the "target" of a major 2013 data breach
  8. 12. a way for security professionals to test systems for vulnerabilities
  9. 13. law protecting the unauthorized distribution of eBooks, etc.
  10. 15. 1994 act requiring backdoors in cell phones
  11. 17. security measure using "something you are"