Across
- 5. Planting false URLs in Domain Name Servers to fish for information
- 7. Security flaws in systems caused by factors like poorly written software
- 10. Restriction of specific content which varies by country
- 13. Tool used to monitor and filter out communication from untrusted sites
- 15. Method to securely store data so it is useless if stolen
- 16. Use of hacking to promote a political cause
- 18. Personal data used by criminals to impersonate innocent people
- 19. Malicious code that can be spread rapidly across the Web
- 20. Personal and financial information requests disguised as legitimate business email
Down
- 1. Act of reporting internal wrongdoings
- 2. Intentional, unauthorized access to computer systems
- 3. software that can spread rapidly over the Web
- 4. Biological characteristics unique to an individual used for high-security
- 6. Process of verifying identity to prevent use of stolen data
- 8. Sophisticated worm that damaged equipment in a uranium enrichment plant
- 9. Breaking into telephone systems Worm
- 11. Identity theft or information gathering conducted via text messaging
- 12. System security hole that can be exploited
- 14. Illegal activities involving computers like credit card theft
- 17. Form of phishing conducted via voice calls
