RU ITEC411-Social, Legal, and Ethical Issues for Computing Technology(Chapter 5)

12345678910111213141516171819
Across
  1. 3. Scam that tricks people into revealing sensitive information via email by impersonating a trusted entity.
  2. 5. SMS phishing scam
  3. 8. Security incidents where unauthorized access exposes sensitive data
  4. 9. Malicious program that replicates and spreads, infecting systems to cause harm.
  5. 11. An attack that overloads a system or network to disrupt its normal functioning
  6. 12. Deliberate deception for financial or personal gain.
  7. 14. Converting data into a secure, unreadable format to protect it from unauthorized access.
  8. 16. Unauthorized system access
  9. 18. Block untrusted communication
  10. 19. Verifying identity credentials
Down
  1. 1. Fake websites that act as a legit business and ask for personal information
  2. 2. Unique biological individuals identification
  3. 4. Voice-based phishing that tricks people into revealing sensitive information over phone calls
  4. 6. Granting access permissions
  5. 7. False defamatory statement
  6. 10. Set of rules or guidelines that govern decisions and actions
  7. 13. Cyber weapon virus
  8. 15. Restricts Computer use without authorization
  9. 16. Use of hacking to promote political or social causes
  10. 17. Exposing unethical behavior