RU ITEC411: Crime and Security.

12345678910111213141516171819
Across
  1. 2. Traveling to sue under strict libel laws in certain countries.
  2. 4. Malicious software designed to gather user information without consent.
  3. 5. The process of encoding information to prevent unauthorized access.
  4. 6. Denial-of-service attack that disrupts online services.
  5. 11. The use of someone else's personal information for fraud
  6. 13. A security tool used to filter and monitor network traffic.
  7. 14. Using hacking to promote a political cause.
  8. 16. Phishing attacks carried out via voice calls.
  9. 17. Fraudulent attempts to obtain sensitive information via email.
  10. 18. Hackers who improve system security by identifying vulnerabilities.
  11. 19. A security tool to lure and study hackers.
Down
  1. 1. Security measures using unique biological characteristics
  2. 3. Measures taken to protect computer systems from cyber attacks.
  3. 4. A sophisticated worm that targeted Iranian nuclear facilities
  4. 7. Manipulating individuals to divulge confidential information.
  5. 8. An organization that addresses trade agreements, including cross-border digital issues.
  6. 9. Phishing attacks carried out via SMS.
  7. 10. The Computer Fraud and Abuse Act that criminalizes unauthorized computer access.
  8. 12. Unauthorized access to or manipulation of computer systems.
  9. 15. Redirecting users to fraudulent websites to steal personal data.