RU ITEC411 - Crime and Security

1234567891011121314151617181920
Across
  1. 4. an act that makes it illegal to access a computer without being authorized
  2. 5. using contextual information about a person to alter an aspect of their social life
  3. 8. politically motivated misuse of a computer
  4. 11. a machine that has been compromised by a hacker
  5. 12. the act of a person intentionally deceiving others
  6. 13. a written defamation
  7. 16. a vulnerable machine that is intentionally used to attract hackers
  8. 17. someone that sends unsolicited messages to large groups of people over the internet
  9. 19. a fraud attempt which targets victims by phone calls
  10. 20. the main purpose of this act was is punish and deter terrorist acts
Down
  1. 1. a fraud attempt which targets victims by text messages
  2. 2. someone who uses a computer to gain unauthorized access to something
  3. 3. A computer program that replicates itself in order to infect other machines
  4. 6. an attack that interrupts a users connection to a network
  5. 7. physical/ behavioral human characteristics that are used to digitally identify someone
  6. 9. malicious code that spreads from machine to machine and changes the way that machine operates
  7. 10. A worm that was discovered in 2010, that destroyed Iran's centrifuges in their uranium enrichment facility
  8. 14. when an attacker steals personal information and uses it to commit an illegal act
  9. 15. an attack where a hacker intentionally redirects a websites traffic to a fake webpage
  10. 18. a fraud attempt which targets victims by email