RU ITEC411 Chapter 5 Crime and Security Crossword

1234567891011121314151617181920
Across
  1. 2. Hacking carried out for political or social activist purposes.
  2. 4. Redirecting website traffic to a fake site to steal credentials.
  3. 5. Phishing conducted over voice calls or voicemail.
  4. 7. An unauthorized intrusion into a computer or network.
  5. 8. Self-replicating malware that spreads across networks without user action.
  6. 10. A published false statement that damages someone's reputation.
  7. 14. Malware that encrypts a victim's files and demands payment for their release.
  8. 17. Decoy systems designed to lure and detect hackers.
  9. 19. Ethical hackers who test systems legally to find vulnerabilities.
  10. 20. Abbrv. An attack that floods a system to make it unavailable to users.
Down
  1. 1. Phishing carried out via SMS text messages.
  2. 3. Gaining unauthorized access to computer systems or networks.
  3. 6. A person who exploits weaknesses in computer systems.
  4. 9. Any software intentionally designed to cause harm to a system.
  5. 11. A hidden method of bypassing normal authentication in a system.
  6. 12. Using physical traits like fingerprints or facial recognition for identification.
  7. 13. Malicious code that attaches to files and spreads when executed.
  8. 15. Fraudulent emails tricking users into revealing sensitive information.
  9. 16. Abbrv. US law criminalizing unauthorized computer access.
  10. 18. US law expanding surveillance powers to combat terrorism post-9/11.