Across
- 3. When hackers hack without any malicious intent.
- 6. Software that duplicate itself and destroys the victim's file.
- 9. used Microsoft Word to email copies of the victims contact list.
- 13. Back in the day, these programmers were seen to be creative with the way they program.
- 14. The crime of using the identity of someone else.
- 16. Hackers use this malware to observe and record victims activities, whether on computers or phones.
- 17. Hackers use this malware to hold victim's data hostage for the gain of payment from their victims.
- 20. A movie that motivated upcoming hackers to hack Defense Department computers.
Down
- 1. When victims receive emails leading them to shady sites and inputting personal information on them.
- 2. A malware that acts as innocent software but is design for malevolent means.
- 4. A book from Clifford Stoll.
- 5. Tricks victims into giving out private informtaion and commit actions that goes against protocol.
- 7. A computer program in the 1980's that shows the weaknesses of the Internet to hacking.
- 8. A worm that was found in the 2000s that spread to over 1 million computers and police body cameras.
- 10. Hackers use this to gain access to their victim's system at a later date evading security protocols.
- 11. The same as phishing, but with text messaging.
- 12. This malware is used by groups of computer devices controlled by the hacker using a center host.
- 15. Scans the victim's system for any weaknesses so it can spread to other systems.
- 18. When hackers lures victims to fake websites with the goal to collect their personal information.
- 19. When websites are overloaded with bots which causes the websites to crash.