RU ITEC411 - Crime and Security

1234567891011121314151617181920
Across
  1. 2. embedded devices connected to the internet
  2. 4. Malicious software designed to look like something else
  3. 8. Luring people to fraudulent websites
  4. 9. Function used to encode information
  5. 11. Malicious software that monitors user activity
  6. 12. Hacking to promote a political agenda
  7. 14. Fraudulent spam
  8. 17. 1980's Law that governs unauthorized access
  9. 19. Unique biological characteristics
  10. 20. Malicious software that exploits vulnerabilities
Down
  1. 1. A group of compromised devices
  2. 3. Allows hackers a future way into a system
  3. 5. Malicious software that encrypts files
  4. 6. criminal deception or trickery
  5. 7. Written defamation
  6. 10. Breaking into gaining unauthorized access (era 2)
  7. 13. Verbal defamation
  8. 15. A creative programmer (era 1)
  9. 16. Malicious software that attaches to programs
  10. 18. Cyberattack designed to overwhelm services