Across
- 3. (2 words) a type of hacker who behaves destructively/unethically.
- 7. The manipulation of people into violating security protocols.
- 8. A cyber attack in which a server or service is overwhelmed with requests.
- 10. (2 words) a type of hacker who behaves constructively, improving security and demonstrating vulnerabilities.
- 14. Software allowing future access to a machine by bypassing security checks.
- 15. Software that attaches to another program. Often replicates.
- 17. (2 words) websites/servers meant to be attractive to hackers for study.
- 18. Malware that holds your files cryptographically hostage pending payment.
- 19. An organization created in response to the Internet Worm incident.
Down
- 1. Malware that logs user activities and sends it to a server.
- 2. Performing acts of technical expertise; has been used both positively and negatively over time.
- 4. (2 words) Malware that appears benign but hides malicious behavior.
- 5. Written defamation.
- 6. The act of hacking for a political cause.
- 9. Verbal defamation
- 11. A group of computers with a virus allowing them to cooperate over a server.
- 12. Luring users to fake sites for the collection of personal data.
- 13. Sending mass messages attempting to steal information.
- 16. An independent piece of software that attempts to replicate to nearby vulnerable systems.
- 19. An act passed in the 1980s, made it illegal to read/copy federally-involved computer systems.
