RU ITEC411 - Chapter 5 - Crime and Security

1234567891011121314151617181920
Across
  1. 4. | Gaining unauthorized access to computer systems.
  2. 5. Theft | Stealing someone’s personal information to impersonate them.
  3. 11. | Malware that locks files and demands payment to unlock them.
  4. 12. of Service | An attack that floods a system with traffic to crash it.
  5. 13. | Malicious software that attaches itself to programs and spreads when they run.
  6. 14. | Definition
  7. 15. of Things | Network of physical devices connected and communicating over the Internet.
  8. 16. | Sending fake messages to trick people into giving away private information.
  9. 20. | Any software designed to harm or exploit systems.
Down
  1. 1. | Phishing attacks carried out through text messages.
  2. 2. | Using hacking for political activism or protest.
  3. 3. | A network of infected devices controlled by hackers.
  4. 4. | A serious security flaw in encryption software that exposed user data.
  5. 6. | A harmful program disguised as a legitimate one.
  6. 7. | The process of scrambling data to protect it from unauthorized access.
  7. 8. | A hidden method to bypass security and access a system.
  8. 9. | Redirecting users to fake websites to steal their data.
  9. 10. | Software that secretly gathers user information without consent.
  10. 17. Engineering | Manipulating people into revealing confidential data.
  11. 18. | A program that spreads by copying itself without needing a host file.
  12. 19. | A team that responds to major cybersecurity incidents.