RU ITEC411 - Chapter 5 - Crime and Security

1234567891011121314151617181920
Across
  1. 5. A hidden method to bypass security and access a system.
  2. 6. A network of infected devices controlled by hackers.
  3. 7. Redirecting users to fake websites to steal their data.
  4. 10. Manipulating people into revealing confidential data.
  5. 11. An attack that floods a system with traffic to crash it.
  6. 12. Any software designed to harm or exploit systems.
  7. 13. Stealing someone’s personal information to impersonate them.
  8. 14. Software that secretly gathers user information without consent.
  9. 17. Sending fake messages to trick people into giving away private information.
  10. 18. A harmful program disguised as a legitimate one.
  11. 19. A program that spreads by copying itself without needing a host file.
  12. 20. A team that responds to major cybersecurity incidents.
Down
  1. 1. Phishing attacks carried out through text messages.
  2. 2. Using hacking for political activism or protest.
  3. 3. A serious security flaw in encryption software that exposed user data.
  4. 4. Gaining unauthorized access to computer systems.
  5. 8. The process of scrambling data to protect it from unauthorized access.
  6. 9. An unmanned aerial device that can be vulnerable to hacking.
  7. 15. Malware that locks files and demands payment to unlock them.
  8. 16. Malicious software that attaches itself to programs and spreads when they run.