RU ITEC411 Chapter 5 - Security

123456789101112131415161718192021
Across
  1. 1. Software that attaches or adds itself to other software
  2. 5. Software designed to monitor and record user activity on a computer
  3. 7. Hacking to promote a political cause
  4. 9. Virus that's responsible for $10B in damages and infected 80% of U.S. federal agencies
  5. 12. Gathering for developing innovative new software and hardware products
  6. 16. Ensuring data that should be private remains private
  7. 19. Software that encrypts personal data and locks it behind a paywall
  8. 20. Defect found in the "heartbeat" section of the OpenSSL code
  9. 21. Software designed to exploit specific system flaws
Down
  1. 2. Device used to collect card information from payment terminals
  2. 3. Trojan that accessed 70 million target customer's data
  3. 4. code library used to send and receive encrypted messages
  4. 6. "A coordinated army of compromised devices"
  5. 8. Spam messages intending to collect information to impersonate someone to steal money and goods
  6. 9. Goal of significant portion of hacking is to steal
  7. 10. Hidden entry point that bypasses normal security
  8. 11. Used to mean a "Computer virtuoso"
  9. 13. Malicious software disguising itself as a harmless program
  10. 14. Beginning of the Internet, linked universities, companies, and government installations
  11. 15. Hack used to damage Iranian centrifuges
  12. 17. ____ hacking, meant to impress and gain respect from peers
  13. 18. Characteristics that are biologically unique to an individual