Across
- 2. software that prevents malware in two ways, scanning files with a new device/software, and monitoring for malware like movements
- 3. biological characteristics unique to an individual
- 5. malware designed to monitor and record a user's activities, can monitor from the keyboard to the camera
- 6. software that allows bypassing security checks to access a system
- 11. an amendment to the CFAA passed to increase penalties for first offenses, also added a broad defintions on antiterrorism that is still critiqued today
- 12. hackers who their skills for illegal destruction and exploitation of system
- 14. while impersonating someone else, send spam mail to receive information from the recipient
- 15. a law passed in the 1980s that dictates where the federal government has jurisdiction on devices
- 17. fake websites used to collect data from visitors
- 19. malware that pretends to be standard benign software
- 20. malware that requires to be attached to software to proliferate
Down
- 1. a two process sign in method used to deter intrusion
- 4. malware that encrypts the system, attackers will give the key after a demand for money is met
- 7. a self-isolated malware that scans for certain system flaws, then scans for more systems with similar flaws
- 8. the process of manipulating people into releasing sensitive data
- 9. the use of hacking as a political tool to promote a cause
- 10. hackers who use their skills to the benefit of a system, finding vulnerabilities before they are exploited
- 13. devices illegally installed inside credit card readers to copy and sell the data
- 16. a herd of systems all infected with a piece of malware that communicates with a central host, individual systems are refereed as bots or zombies
- 18. an attack that uses a botnet to spam requests to deny access to services
