RU ITEC411 Chapter 5 Crime and Security

1234567891011121314151617181920
Across
  1. 2. Early packet switching network, seen as the predecessor for modern internet.
  2. 3. Software intentionally designed to cause disruption.
  3. 4. Use of cyber-attacks against a state, causing comparable harm to warfare.
  4. 7. A destructive computer worm that spread rapidly through email attachments.
  5. 9. Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
  6. 10. Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
  7. 14. Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
  8. 18. A short-range wireless technology that allows electronic devices to communicate.
  9. 20. Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
  1. 1. Ethical hacking of a computer system to evaluate security weaknesses and address them.
  2. 3. A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
  3. 5. Use of computer hacking to promote political agenda or social change.
  4. 6. A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
  5. 8. An open-source library that provides secure communication between computer networks.
  6. 11. A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
  7. 12. A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
  8. 13. Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
  9. 15. Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
  10. 16. Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
  11. 17. Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
  12. 19. Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.