RU ITEC411-Crime and Security

1234567891011121314151617181920
Across
  1. 2. software that prevents malware in two ways, scanning files with a new device/software, and monitoring for malware like movements
  2. 3. biological characteristics unique to an individual
  3. 5. malware designed to monitor and record a user's activities, can monitor from the keyboard to the camera
  4. 6. software that allows bypassing security checks to access a system
  5. 11. an amendment to the CFAA passed to increase penalties for first offenses, also added a broad defintions on antiterrorism that is still critiqued today
  6. 12. hackers who their skills for illegal destruction and exploitation of system
  7. 14. while impersonating someone else, send spam mail to receive information from the recipient
  8. 15. a law passed in the 1980s that dictates where the federal government has jurisdiction on devices
  9. 17. fake websites used to collect data from visitors
  10. 19. malware that pretends to be standard benign software
  11. 20. malware that requires to be attached to software to proliferate
Down
  1. 1. a two process sign in method used to deter intrusion
  2. 4. malware that encrypts the system, attackers will give the key after a demand for money is met
  3. 7. a self-isolated malware that scans for certain system flaws, then scans for more systems with similar flaws
  4. 8. the process of manipulating people into releasing sensitive data
  5. 9. the use of hacking as a political tool to promote a cause
  6. 10. hackers who use their skills to the benefit of a system, finding vulnerabilities before they are exploited
  7. 13. devices illegally installed inside credit card readers to copy and sell the data
  8. 16. a herd of systems all infected with a piece of malware that communicates with a central host, individual systems are refereed as bots or zombies
  9. 18. an attack that uses a botnet to spam requests to deny access to services