RU ITEC411

1234567891011121314151617181920
Across
  1. 2. A law passed after 9/11 that expanded government surveillance powers to fight terrorism.
  2. 4. Data kept by internet service providers about your internet activity.
  3. 5. Fake computer systems set up to attract and catch hackers.
  4. 10. A type of malware that spreads on its own across computers without needing user action.
  5. 11. Ethical hackers who test systems to find and fix security problems.
  6. 13. Software that detects and removes programs that secretly collect your data.
  7. 16. Security methods that use body traits (like fingerprints or face recognition).
  8. 18. Hacking that is done to promote a political or social cause.
Down
  1. 1. Overloading a website or server so it crashes or becomes unavailable.
  2. 3. Filing a lawsuit in a place with laws favorable to the person claiming defamation.
  3. 6. Stealing someone’s personal information to commit fraud.
  4. 7. A U.S. law that makes unauthorized access to computers illegal.
  5. 8. Records of activity (like connections and traffic) stored by a network router.
  6. 9. Tricking people into giving personal info (like passwords) through fake emails or websites.
  7. 12. Breaking into a computer system or network, usually without permission.
  8. 14. A global network that connects computers and allows communication and information sharing.
  9. 15. Security systems that block or allow network traffic to protect computers from threats.
  10. 17. A powerful computer worm designed to damage industrial systems (famously used against Iran’s nuclear program).
  11. 19. Anything related to computers, networks, or the internet.
  12. 20. Phishing done through phone calls or voice messages.