RU ITEC411-Chapter 5 Crime and Security

1234567891011121314151617181920
Across
  1. 1. Published false statement that damages someone's reputation
  2. 4. Self replicating malicious software that spreads through networks automatically
  3. 6. Highly sophisticated computer worm that targeted Iranian facilities
  4. 8. Identity theft technique using text messages to obtain financial information
  5. 10. Security system that monitors and filters network traffic from suspicious sources
  6. 11. Security incident where unauthorized parties access protected systems or data
  7. 13. International organization whose members agree on cross-border trade and service rules
  8. 15. Unauthorized access to computer systems without permission
  9. 17. Legal term describing unauthorized computer system entry
  10. 19. Using computer techniques to promote political causes
  11. 20. Converting data into coded format to protect stolen information from being useful
Down
  1. 2. Authentication method using unique biological characteristics like fingerprints
  2. 3. Scientific process of retrieving digital evidence from computers and storage devices
  3. 5. Fraudulent emails disguised as legitimate communications to steal personal information
  4. 7. Exposing security flaws or wrongdoing within an organization
  5. 9. Verifying the identity of users or the legitimacy
  6. 12. Decoy website set up to attract and study hacker behavior
  7. 14. Cyber attack using false websites planted in domain name servers to collect data
  8. 16. Federal law passed in 1984 making unauthorized computer access illegal
  9. 18. Voice based fraud method where criminals call victims pretending to be legitimate businesses