Across
- 2. The legal case establishing that citizens had a reasonable right to privacy for their private email.
- 6. Utilizing digital networks and technology to launch attacks designed to incite fear and societal disruption.
- 8. The primary motivation behind normal digital crimes, as opposed to ideologically driven attacks.
- 9. The genuine nature of digital evidence that must be protected through careful documentation to ensure successful convictions.
- 10. Personal limiters placed on yourself or others determining a course of action.
- 11. The nation that suffered a massive power grid disruption in 2015 due to a coordinated remote attack.
- 13. The legal status of evidence that can be presented in court, which can be lost if proper handling procedures are not strictly followed.
- 15. The Supreme Court case that established that internet speech receives the same protections as traditional speech.
- 16. The specific constitutional amendment heavily debated in cyber laws regarding the protection of online speech and expression.
- 19. The foundational US document designed to protect citizen rights, though applying it to modern digital issues has proven challenging.
- 20. Mass unsolicited emails
- 21. Deceptive emails used by attackers as a method to gain unauthorized remote access into secure systems.
Down
- 1. Harmful software commonly sent through spam emails by bots to attack users.
- 3. The unbroken chain of documentation required to prove who handled digital evidence from the moment it was collected.
- 4. One of the first viruses used to cause physical damage, sabotaged Iranian nuclear centrifuges.
- 5. A system a person uses to determine right or wrong.
- 7. A common motivator for many online actions for the sake of a thrill, or amusement.
- 12. A specific type of malicious software utilized during the 2015 electric grid attack to disrupt industrial control systems.
- 14. The constitutional amendment requiring law enforcement obtain a warrant to search your property or later digital activity.
- 17. A location wise how most digital crimes happen.
- 18. The result of one's actions.
