Across
- 2. (CERT)/developed coding standards for secure software development
- 4. breaking into computer Systems and releases viruses
- 6. attempting to gain access to an information system to violate the integrity of the system or its services
- 7. A US&Israel government collaboration project that successfully destroyed Irans nucleal weapons production
- 8. malware that encrypts files on a computer/device and displays a message demanding payment
- 11. Using hacking to promote a political cause
- 13. does not attach itself, designed to exploit specific software system flaws.
- 14. software controls access to the hardware and makes apps/files available to users
- 15. The beginning of the internet ,linking together a number of universities, tech companies and government installations
- 16. overwhelming servers with packets and frames causing slowdowns and server crashes
- 17. software that attaches or adds itself to other software
- 18. malware that can monitor and record user activities on a computer or mobile device
- 19. software that allows access to a computer system or device by bypassing layers of security checks
- 20. luring people to fake websites where thieves collect personal data
Down
- 1. CFAA
- 3. Messages that tells victim to click on a link to a seemingly well known company website in order to steal information or install viruses
- 5. the process of converting information or data into a code, especially to prevent unauthorized access.
- 9. biological characteristics that are unique to an individual
- 10. malware that appears to be a benign software application.
- 12. The manipulation of people into performing a task that violates security protocols