Across
- 3. The use of false domains/URLs to steal personal/financial information
- 8. The main federal computer-crime law passed in 1980
- 10. Biological characteristics that are unique to each individual
- 12. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
- 14. These people developed coding standards for secure software development
- 16. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
- 19. The exchange of goods/services over the internet
- 20. Hacking to promote a political cause
- 21. The --------- system controls access to a computer's hardware, applications, and files.
Down
- 1. Ensuring data that should be private remains private
- 2. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
- 4. The process of verifying the identity of a person
- 5. The type of theft in which a criminal uses the identity of an unknowing innocent person
- 6. Used to monitor/filter out unwanted communication from untrusted sites and/or suspicious activity
- 7. Hackers who use their skills to improve system security
- 9. Hackers whose activities are destructive
- 11. Software created with the intent to harm computer hardware/software
- 13. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
- 15. An application is ------ if it has a digital certificate attached to it
- 17. A way in which one can transform readable data into an unreadable cypher
- 18. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment