RU ITEC411-Crime and Security

12345678910111213141516171819202122
Across
  1. 3. gaining unauthorized access to data in a system or computer
  2. 4. software that allow future access to a computer system by bypassing the normal layers of security.
  3. 7. can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
  4. 9. biological characteristics unique to an individual
  5. 12. criminal activity that involves the use of a computer r a network
  6. 13. person that uses their technical knowledge to break into a computer system or network by no standard means.
  7. 14. irrelevant or inappropriate messages sent in bulk to recepients
  8. 16. malware that can monitor or record victim's activities on a computer or mobile phone
  9. 18. group of internet connected devices each of which runs one or more bots.
  10. 19. use of computers or computer network techniques such as hacking to promote political agenda
  11. 22. the assurance that private data will remain private
Down
  1. 1. sending fraudulent text messages on purpose appearing to come from reputable and legit companies
  2. 2. the assurance that data will not change without authorization
  3. 5. malware that blocks access to data or threatens to publish it unless a ransom is paid.
  4. 6. recording devices inside credit card readers to collect credit card numbers and PINs.
  5. 8. converting information into secret code that hides the meaning of the information
  6. 10. protection of computer systems and networks from information theft or hardware damage.
  7. 11. the way in which thieves collect personal data by luring the victims to fake websites
  8. 15. sending deceiving emails in order to obtain sensitive personal information from the victim
  9. 17. malicious computer worm that targets a specific type of control system
  10. 20. software designed intentionally to be intrusive and destructive to a computer or network
  11. 21. software that attaches itself to other software and spreads when someone runs an infected program.