Across
- 3. A false website that convinces people to enter personal information
- 5. The act of changing data to make it unreadable to others to protect the privacy of the information
- 8. An act by criminals to gain access to computers illegally
- 10. Malicious software that will lock computers and/or lock/encrypt files and require payment to have them unlocked
- 11. An attack that hackers use to overload websites with repetitively request for information
- 14. Sending scam emails to trick people into giving away person information
- 15. An in-person use of hacking involving manipulation someone into giving away personal information or private information about a company
- 16. Websites that lure hackers to observe their actions
- 17. Nickname for hackers who attempt to purposefully do damage
- 19. Characteristics involving DNA such as fingerprints, voice, and face structures
Down
- 1. A blanket term for all different types of malicious software and viruses
- 2. Software that allows a person to gain access to software by passing the normal security measures
- 4. Malicious software installed on a computer to observe user’s actions
- 6. A law to protect computers under federal government jurisdiction (ABBR)
- 7. The use of hacking with political motivations
- 9. Nickname for hackers who only do so to help improve security
- 12. The act of gathering personal details to impersonate someone else
- 13. A public written statement attacking a person’s character
- 14. A person or team of people who take the role of a hacker and try to get through security measures
- 18. A malicious computer program that attaches itself to software and can spread itself
