Across
- 3. Fraudulent spam emails to gather information used to impersonate someone, steal money or goods.
- 4. Placing false IP address in the tables on a DNS that leads to a counterfeit site for gathering personal data.
- 9. Various crimes in which a criminal or group uses the identity of a person.
- 10. Ensure systems, services, data are accessible when needed.
- 11. An attack in which a botnet overwhelms a system or website with requests that stops users from accessing the system or website.
- 12. Malware that monitors and records activities on an electronic device.
- 14. Fraudulent spam texts to gather information used to impersonate someone, steal money or goods.
- 17. Recording device used to steal credit/debit card information.
- 18. Group of electronic devices that have a malware that controls them via a central host that coordinates the army to perform tasks.
- 19. Biological characteristics unique to an individual.
Down
- 1. Ensure data should be private remain private.
- 2. Software that gives access to an electronic device by bypassing security checks.
- 5. Manipulation of people to get information or do a task that violates security protocols, two words no spaces.
- 6. Malware that asks as a normal software but has malicious abilities hidden.
- 7. A system that calculates a customer's bill when checking out and starts payment.
- 8. Malware that encrypts files on an electronic devices, then asks for payment to decrypt files.
- 13. Software that attaches to a program.
- 15. Similar to virus, does not attach itself to other programs.
- 16. Use of hacking to promote a political cause.
- 20. Ensure data is not changed without authorization, stays consistent over time and stays sync with real world.
