RU ITEC411 Chapter 5

12345678910111213141516171819
Across
  1. 3. bug that exploited a weakness in OpenSSL
  2. 4. accessing systems that you are not authorized to access
  3. 7. use of voice print of fingerprint
  4. 8. a route that skips regular security in software
  5. 9. malicious software that can change and wreak havoc on your system
  6. 13. malware that locks users out of the system via encryption
  7. 14. email scams
  8. 16. the James Bond of malware
  9. 17. malicious software that disguises itself
  10. 18. devices that use rfid to capture data
  11. 19. fake website scam
Down
  1. 1. is not a joke Jim
  2. 2. worm that attacked Iran's nuclear centrifuges
  3. 3. hacking for a cause
  4. 5. acronym, attack that slows down a server with requests
  5. 6. beginnings of the internet
  6. 10. country that was targeted by Russia and attacked its power grid
  7. 11. an amalgamation of malicious devices that creates zombies
  8. 12. scrambling code to make it unreadable for security
  9. 15. one of its kind was named Conficker