RU ITEC411 Chapter 5

12345678910111213141516171819
Across
  1. 1. Ensuring consistent access to the system, services, and data whenever necessary.
  2. 7. first made to use idle computer resources but were later misused for harm, spreading by copying themselves to other computers.
  3. 8. Hacking started to have a bad meaning during the late 1970s to 1990s
  4. 9. typically viewed as a criminal act where people break into computer systems to release viruses and steal important data.
  5. 11. involves using hacking techniques to further a political agenda or promote a specific cause.
  6. 13. tricks your browser into visiting fake sites that steal your info by messing with DNS records.
  7. 15. Maintaining data accuracy by preventing unauthorized changes and ensuring it stays consistent and aligned with real-world information.
  8. 16. Hacking was considered a good thing in the time periods of the 1960s and 1970s
  9. 17. a key security tool, wasn't initially incorporated into the core Internet protocol TCP/IP due to the high cost of computing power required. Additionally, securely sharing decryption keys presented a significant challenge at that time.
  10. 18. Safeguarding private data to ensure it stays protected.
  11. 19. tricks people into giving up information or breaking security rules
Down
  1. 2. is software that latches onto programs, duplicates itself, and can carry out tasks like deleting files or sending emails. It spreads when people use infected programs or open compromised attachments.
  2. 3. is a secret way into a device that avoids its usual security checks. Hackers use it to access systems later, while developers might create one for easy system access or to gather user data.
  3. 4. sneaky malware pretending to be safe software. People unknowingly run it, thinking it's harmless, but it secretly performs bad actions like installing viruses or sending spam.
  4. 5. is a hacker's network of infected devices, controlled from a central server. These compromised devices, or bots, perform tasks like spamming or cyberattacks, acting as the hacker's directed team.
  5. 6. locks files, demands untraceable payment, and led to around 4000 daily attacks in 2016, with millions paid to hackers, as reported by the U.S. Department of Justice.
  6. 10. are unique biological traits like fingerprints, voice patterns, and DNA, distinguishing one person from another. DNA is commonly used in law enforcement for identification purposes
  7. 12. quietly watches devices, stealing data by logging keystrokes and tracking online actions. It can also secretly control webcams, sending info to hackers without users knowing.
  8. 13. cams that use fake messages to trick people into sharing personal information by clicking on false website links, often using fake security alerts as a lure for fraud.
  9. 14. What was the computer program that found a big vulnerability of the internet due to hacking
  10. 17. 1990s through present day, e-commerce