Across
- 1. A concealed entry point in communication systems
- 3. Enhanced account security using multiple steps(acronym)
- 9. This law places restrictive measures on information.
- 10. Covert software that gathers user data
- 11. Retail corporation affected by a major data breach in 2007.
- 13. Legislation protecting intellectual property.
- 15. Proving one's identity
- 17. A United States federal law that governs unauthorized access to computer systems and data
- 18. Deceptive cybersecurity trap for hackers.
- 19. Activist use of hacking for social or political causes
- 20. This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
- 2. False statements harming one's reputation.
- 4. False spoken statements harming reputation.
- 5. This process transforms information into a coded form to protect it from unauthorized access
- 6. Using unique physical features for identification
- 7. Malicious software that replicates and infects
- 8. system is used in retail to process transactions, record sales, and manage inventory(acronym.
- 12. Ethical hacking for security assessment.
- 14. Deceptive online tactic to steal personal information
- 16. U.S. law for wiretaps and law enforcement access