RU ITEC411 Crime and Security

1234567891011121314151617181920
Across
  1. 2. a space in which computers communicate
  2. 6. wrongdoing for financial gain
  3. 7. program that produces duplicates of itself on other computers
  4. 8. something that is fake or fraudulent
  5. 10. person who gets access to a computer for political or social ends
  6. 13. the act of swaying people to a website to get personal information
  7. 14. software that damages or gains unauthorized access to another computer
  8. 16. attack over an email trying to gain sensitive information
  9. 19. software to gain access to a computer in a nontraditional way
  10. 20. large number of messages sent over the internet
Down
  1. 1. communicating on a distance through cable or broadcasting system
  2. 3. a virus attack with a multipart worm that traveled on a USB stick that was carried out by the US and Isreal
  3. 4. a number of computers that have a virus or malware that communicates to a host
  4. 5. attack over text message trying to gain personal information
  5. 9. a type of software that adheres itself to other software
  6. 11. an attack by a hacker to damage a computer network
  7. 12. encrypted malware that displays a message wanting payment for the key to gain the personal information back from the user
  8. 15. malware that can watch and record a users activities on a computer
  9. 17. breaking into something you do not have access to
  10. 18. is shown as a not-bad application but then carries a bad component