RU ITEC411

123456789101112131415161718192021
Across
  1. 2. The legal case establishing that citizens had a reasonable right to privacy for their private email.
  2. 6. Utilizing digital networks and technology to launch attacks designed to incite fear and societal disruption.
  3. 8. The primary motivation behind normal digital crimes, as opposed to ideologically driven attacks.
  4. 9. The genuine nature of digital evidence that must be protected through careful documentation to ensure successful convictions.
  5. 10. Personal limiters placed on yourself or others determining a course of action.
  6. 11. The nation that suffered a massive power grid disruption in 2015 due to a coordinated remote attack.
  7. 13. The legal status of evidence that can be presented in court, which can be lost if proper handling procedures are not strictly followed.
  8. 15. The Supreme Court case that established that internet speech receives the same protections as traditional speech.
  9. 16. The specific constitutional amendment heavily debated in cyber laws regarding the protection of online speech and expression.
  10. 19. The foundational US document designed to protect citizen rights, though applying it to modern digital issues has proven challenging.
  11. 20. Mass unsolicited emails
  12. 21. Deceptive emails used by attackers as a method to gain unauthorized remote access into secure systems.
Down
  1. 1. Harmful software commonly sent through spam emails by bots to attack users.
  2. 3. The unbroken chain of documentation required to prove who handled digital evidence from the moment it was collected.
  3. 4. One of the first viruses used to cause physical damage, sabotaged Iranian nuclear centrifuges.
  4. 5. A system a person uses to determine right or wrong.
  5. 7. A common motivator for many online actions for the sake of a thrill, or amusement.
  6. 12. A specific type of malicious software utilized during the 2015 electric grid attack to disrupt industrial control systems.
  7. 14. The constitutional amendment requiring law enforcement obtain a warrant to search your property or later digital activity.
  8. 17. A location wise how most digital crimes happen.
  9. 18. The result of one's actions.