RU ITEC411 - Crime and Security

12345678910111213141516171819
Across
  1. 3. Software that secretly gathers information from a computer system
  2. 5. Illegal access into a telephone system to make unauthorized calls
  3. 9. A temporary fix for a program
  4. 10. A cybercrime involving pretending to be someone to trick victims or access sensitive information
  5. 11. When a program or system suddenly stops functioning
  6. 15. A weakness in a computer system
  7. 17. Multiple computers working together to solve a complex challenge
  8. 18. Technologies that use an individual's traits for identity verification
  9. 19. To remove or alter data that contains sensitive information
Down
  1. 1. Software that prevents users from accessing their data until payment is made
  2. 2. A method of bypassing a computer’s security measures
  3. 4. An attack that uses identity deception to access sensitive information
  4. 6. The process of converting plaintext into ciphertext
  5. 7. Software designed for harmful intent toward computer systems
  6. 8. Someone without permission who breaks into a computer system
  7. 12. An attack that redirects users to fake websites
  8. 13. Using two or more types of verification for authentication
  9. 14. Harmful software that can self-replicate and spread
  10. 16. Moral principles that prevent harm when using computer technologies
  11. 18. A network of devices controlled by bots from hijacked computers