RU ITEC411 - Chapter 5: Crime and Security

1234567891011121314151617181920
Across
  1. 2. Decieving, faking, or tricking
  2. 5. malware that spies on users' activity on a computer
  3. 9. websites that are meant to represent well-known companies that steal information
  4. 11. making sure private data stays private
  5. 13. false written information intended to hurt someones reputation
  6. 15. Malicious Software
  7. 16. term used for hackers who use abilities for good
  8. 18. verbally hurting someone's reputation with false information
  9. 20. devices that are installed on card readers that steal information
Down
  1. 1. a form of testing that involves trying to force a way into a system to test security
  2. 3. making sure data is not altered by unauthorized individuals
  3. 4. a virus that was intended to damage uranium centrifuges in Iran
  4. 6. term used for hackers who hack for illegal purposes
  5. 7. making sure data is available when it's needed
  6. 8. malware that encrypts and locks the important files in a database, usually only freed by a large payment
  7. 10. biological characteristics that are different and unique for everyone
  8. 12. a virus that spread very quickly, infecting around 80% of U.S Federal Agencies and deleted files.
  9. 14. software that creates an entry point for a later date that bypasses security protocols
  10. 17. hacking for political reasons
  11. 19. form of malware that infiltrates and duplicates within a system