RU ITEC411 Chapter 5 Crime and Security

12345678910111213141516171819
Across
  1. 5. something that will spread one its own
  2. 6. information gathering software
  3. 7. a network of computers being controlled
  4. 9. returning what has been lost to its owner
  5. 11. something that needs a host to spread
  6. 13. being locked out of a computer or system until someone is paid
  7. 14. digital world
  8. 17. something disguised as something else
  9. 18. sending out messages impersonating someone or something
  10. 19. deception for someone's gain
Down
  1. 1. bad software
  2. 2. obstructing or ruining something
  3. 3. to be kept secret
  4. 4. stealing someone's information for impersonation
  5. 8. instruction sets
  6. 9. spying on someone or something
  7. 10. a soft spot in a piece of software
  8. 12. manipulatively finding information out about someone or something
  9. 15. team to manage cybersecurity incidents
  10. 16. using a spoofed website to steal information