Across
- 4. an act that makes it illegal to access a computer without being authorized
- 5. using contextual information about a person to alter an aspect of their social life
- 8. politically motivated misuse of a computer
- 11. a machine that has been compromised by a hacker
- 12. the act of a person intentionally deceiving others
- 13. a written defamation
- 16. a vulnerable machine that is intentionally used to attract hackers
- 17. someone that sends unsolicited messages to large groups of people over the internet
- 19. a fraud attempt which targets victims by phone calls
- 20. the main purpose of this act was is punish and deter terrorist acts
Down
- 1. a fraud attempt which targets victims by text messages
- 2. someone who uses a computer to gain unauthorized access to something
- 3. A computer program that replicates itself in order to infect other machines
- 6. an attack that interrupts a users connection to a network
- 7. physical/ behavioral human characteristics that are used to digitally identify someone
- 9. malicious code that spreads from machine to machine and changes the way that machine operates
- 10. A worm that was discovered in 2010, that destroyed Iran's centrifuges in their uranium enrichment facility
- 14. when an attacker steals personal information and uses it to commit an illegal act
- 15. an attack where a hacker intentionally redirects a websites traffic to a fake webpage
- 18. a fraud attempt which targets victims by email
