Across
- 2. Field of gathering evidence from computers… ______ forensics
- 9. Type of theft where someone uses someone else’s namesake… ______ theft
- 11. What type of hacking is used to promote politics?
- 12. From the 1970s to 1990s, this meant manipulating a telephone… “phone ______”
- 15. A clever piece of code in the 1960s to 70s
- 16. Under the Computer Fraud and Abuse Act, accessing a computer without authorization is _____
- 17. Sophisticated program that started in Iran in 2008
- 19. The main federal computer crime law in 1984 (abbreviation)
Down
- 1. Using social techniques to trick people into giving up secure information…. “social _______”
- 3. What color hat type of hacker uses their skills for good?
- 4. Type of social engineering where someone uses fraudulent spam to gather secure information
- 5. What color hat type of hacker uses their skills for criminal or unethical activity?
- 6. What is a tool used to filter and monitor communication?
- 7. Someone who breaks into computers without access (1970s to 90s)
- 8. What act expanded on the Computer Fraud and Abuse Act?
- 10. What is the abbreviation of an attack used to shut down an online website –
- 11. A creative programmer in the 1960s to 70s
- 13. What color hat type of hacker uses their skills for good but publicize vulnerabilities beforehand?
- 14. Attractive sites for hackers are called _____ pots
- 18. Most types of hacking is a form of what?
