RU ITEC411- Crime and Security

12345678910111213141516171819
Across
  1. 4. Hacking to promote a political cause
  2. 6. These people developed coding standards for secure software development
  3. 8. The main federal computer-crime law passed in 1980
  4. 9. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
  5. 14. The exchange of goods/services over the internet
  6. 16. Hackers who use their skills to improve system security
  7. 17. The process of verifying the identity of a person
  8. 18. The use of false domains/URLs to steal personal/financial information
  9. 19. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
Down
  1. 1. Biological characteristics that are unique to each individual
  2. 2. Hackers whose activities are destructive
  3. 3. Software created with the intent to harm computer hardware/software
  4. 5. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
  5. 7. A way in which one can transform readable data into an unreadable cypher
  6. 10. An application is ------ if it has a digital certificate attached to it
  7. 11. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
  8. 12. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
  9. 13. The --------- system controls access to a computer's hardware, applications, and files.
  10. 15. Ensuring data that should be private remains private