RU ITEC411 - Crime and Security (Ch 5)

12345678910111213141516171819
Across
  1. 3. A false website that convinces people to enter personal information
  2. 5. The act of changing data to make it unreadable to others to protect the privacy of the information
  3. 8. An act by criminals to gain access to computers illegally
  4. 10. Malicious software that will lock computers and/or lock/encrypt files and require payment to have them unlocked
  5. 11. An attack that hackers use to overload websites with repetitively request for information
  6. 14. Sending scam emails to trick people into giving away person information
  7. 15. An in-person use of hacking involving manipulation someone into giving away personal information or private information about a company
  8. 16. Websites that lure hackers to observe their actions
  9. 17. Nickname for hackers who attempt to purposefully do damage
  10. 19. Characteristics involving DNA such as fingerprints, voice, and face structures
Down
  1. 1. A blanket term for all different types of malicious software and viruses
  2. 2. Software that allows a person to gain access to software by passing the normal security measures
  3. 4. Malicious software installed on a computer to observe user’s actions
  4. 6. A law to protect computers under federal government jurisdiction (ABBR)
  5. 7. The use of hacking with political motivations
  6. 9. Nickname for hackers who only do so to help improve security
  7. 12. The act of gathering personal details to impersonate someone else
  8. 13. A public written statement attacking a person’s character
  9. 14. A person or team of people who take the role of a hacker and try to get through security measures
  10. 18. A malicious computer program that attaches itself to software and can spread itself