RU ITEC411 Crime and Security

1234567891011121314151617181920
Across
  1. 2. Utilizing or exploiting weaknesses in a network or computer system.
  2. 6. A country/state returning a wanted individual to another country or state.
  3. 7. Written or published defamation.
  4. 8. Using hacking to promote certain causes like political or social causes.
  5. 10. Being protected from danger or threats.
  6. 12. Organization dealing with global trade rules
  7. 13. Unlawful use and theft of another's identifying information.
  8. 14. Very sophisticated computer worm that damaged enrichment plant in Iran.
  9. 18. Security system on a computer meant to block access to certain things.
  10. 19. Finding ways around obstacles and problems, think loopholes.
  11. 20. Supreme power or sole authority of a state or governing entity over itself.
Down
  1. 1. Increasing connectedness amongst the world.
  2. 3. Legal authority of governments and entities to hear cases and make judgements.
  3. 4. Act that greatly expanded law enforcement counter-terror ability after Sept 11th attacks.
  4. 5. System designed to lure in cyber criminals/hackers.
  5. 9. Malicious self-replicating software that infects a computer.
  6. 11. Right to express opinions and ideas without prosecution.
  7. 15. Going to another country with better odds of winning a court case and suing for defamation.
  8. 16. Public defiance (usually nonviolent) of local laws or policies.
  9. 17. Making individuals and entities obey laws, policy, etc.