RU ITEC411- Crime and Security

1234567891011121314151617181920
Across
  1. 3. - receives hundreds of thousands of complaints of identity theft each year. Losses from identity theft amount to billions of dollars per year in the U.S., with several million victims.
  2. 7. - act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger
  3. 10. - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers
  4. 11. - a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
  5. 12. - Companies began using hackers to analyze and improve security
  6. 14. - A computer worm designed to find and infect a particular piece of industrial hardware, used in an attack against Iranian nuclear plants
  7. 15. - Use of hacking to promote a political cause
  8. 17. - Use their skills to demonstrate system vulnerabilities and improve security
  9. 18. - Attacks used to shut down Websites
  10. 19. - Phishing attacks committed using text messages (SMS)
  11. 20. - Which part of government is considered and treats some cyber attacks as acts of war, and the U.S. might respond with military force.
Down
  1. 1. - read hacker newsletters and participate in chat rooms undercover. They can often track a handle by looking through newsgroups or other archives
  2. 2. - Monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity
  3. 4. - variety of factors contribute to security weaknesses
  4. 5. - various crimes in which criminals use the identity of an unknowing, innocent person
  5. 6. - Intentional, unauthorized access to computer system
  6. 8. - An especially clever piece of code
  7. 9. - trace viruses and hacking attacks by using ISP records and router logs
  8. 13. - An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  9. 16. - has made it easier to steal and use card numbers without having the physical card