RU ITEC411- Crime and Security

123456789101112131415161718192021
Across
  1. 3. The use of false domains/URLs to steal personal/financial information
  2. 8. The main federal computer-crime law passed in 1980
  3. 10. Biological characteristics that are unique to each individual
  4. 12. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
  5. 14. These people developed coding standards for secure software development
  6. 16. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
  7. 19. The exchange of goods/services over the internet
  8. 20. Hacking to promote a political cause
  9. 21. The --------- system controls access to a computer's hardware, applications, and files.
Down
  1. 1. Ensuring data that should be private remains private
  2. 2. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
  3. 4. The process of verifying the identity of a person
  4. 5. The type of theft in which a criminal uses the identity of an unknowing innocent person
  5. 6. Used to monitor/filter out unwanted communication from untrusted sites and/or suspicious activity
  6. 7. Hackers who use their skills to improve system security
  7. 9. Hackers whose activities are destructive
  8. 11. Software created with the intent to harm computer hardware/software
  9. 13. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
  10. 15. An application is ------ if it has a digital certificate attached to it
  11. 17. A way in which one can transform readable data into an unreadable cypher
  12. 18. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment