RU ITEC411 - Chapter 5

12345678910111213141516171819
Across
  1. 2. Field of gathering evidence from computers… ______ forensics
  2. 9. Type of theft where someone uses someone else’s namesake… ______ theft
  3. 11. What type of hacking is used to promote politics?
  4. 12. From the 1970s to 1990s, this meant manipulating a telephone… “phone ______”
  5. 15. A clever piece of code in the 1960s to 70s
  6. 16. Under the Computer Fraud and Abuse Act, accessing a computer without authorization is _____
  7. 17. Sophisticated program that started in Iran in 2008
  8. 19. The main federal computer crime law in 1984 (abbreviation)
Down
  1. 1. Using social techniques to trick people into giving up secure information…. “social _______”
  2. 3. What color hat type of hacker uses their skills for good?
  3. 4. Type of social engineering where someone uses fraudulent spam to gather secure information
  4. 5. What color hat type of hacker uses their skills for criminal or unethical activity?
  5. 6. What is a tool used to filter and monitor communication?
  6. 7. Someone who breaks into computers without access (1970s to 90s)
  7. 8. What act expanded on the Computer Fraud and Abuse Act?
  8. 10. What is the abbreviation of an attack used to shut down an online website –
  9. 11. A creative programmer in the 1960s to 70s
  10. 13. What color hat type of hacker uses their skills for good but publicize vulnerabilities beforehand?
  11. 14. Attractive sites for hackers are called _____ pots
  12. 18. Most types of hacking is a form of what?