RU ITEC411 Crime and Security

12345678910111213141516171819
Across
  1. 2. A verbal form of defamation
  2. 6. One of the three principles of the CIA triad
  3. 7. One of the three principles of the CIA triad
  4. 13. A group of computers infected with malware controlled by a host
  5. 15. One of the three principles of the CIA triad
  6. 16. Software that can replicate itself and does not need to be activated
  7. 17. Hacking for political motivation
  8. 18. A way of protecting data through scrambling text
  9. 19. A written form of defamation
Down
  1. 1. directing people to fake websites to collect personal data
  2. 3. Software that can replicate itself but needs to be activated
  3. 4. Physical characteristics used to secure data
  4. 5. The act of protecting computer systems
  5. 8. Malicious code that looks to be harmless
  6. 9. Gaining access to a computer or system without permission
  7. 10. Act of sending emails in order to gain someone's personal information
  8. 11. A type a malware that records activities on a computer
  9. 12. Recording devices that are installed in card readers
  10. 13. A method used to get around normal security measures
  11. 14. A type of malware that locks a computer until money is paid