Across
- 4. Software that's malicious, demands payment to get back locked files
- 5. To advance a political or social cause by using some computer infiltration techniques
- 8. A professional who uses their hacking skills in an ethical way to improve the defenses of systems
- 11. Intentionally accessing a computer system without authorization
- 12. An entire network of machines that are compromised remotely by someone
- 15. A virus made by the U.S. and Israel to ruin Iran's nuclear centrifuges
- 17. When physical attributes are used to verify identity, like a fingerprint or eye pattern
- 19. Malware that looks legitimate, but it's a trick to get users to run it
- 20. Lying in messages to trick users into giving personal info
- 22. A system thats a decoy meant to attract hackers so they can be studied
- 23. an attack that is actually authorized, and used to simulate how an attacker could get into a system
Down
- 1. The main federal law in the U.S. that makes it illegal to access others computers without permission
- 2. Flaw or weakness in systems that attackers can try to exploit
- 3. Software that is malicious in its intent to damage or reach a device
- 6. A law from 1994 that required phone equipment to allow for government interception
- 7. A type of software that monitors and record a users activity secretly
- 9. Used to prevent unauthorized access by converting data into code form
- 10. A program that is self-replicating, spreads across multiple networks
- 13. Stealing personal info to commit fraud using that persons name
- 14. an attack by flooding a server with traffic, making everyone else unable to access it
- 16. Technique used when corrupting a domain name server to redirect users to a different dangerous website
- 18. A hidden way into a software that gets around the security measures in place
- 21. A device that can be hidden on card readers that steals payment info
