Computer crime
Across
- 1. Viruses - Viruses that affect multiple locations on a computer to make it harder to detect.
- 5. Software - Any program designed to damage or disrupt systems.
- 7. - Deceitful practices used to gain financial or personal information.
- 8. Soliciting and Abuse - Using online means to exploit minors.
- 9. Terrorism - Cyberattacks meant to create widespread fear or panic.
- 11. Theft - Stealing personal data to impersonate someone for malicious purposes.
- 12. - One of the main entities targeted in categorization of cybercrime.
- 13. - Unauthorized access to computer systems to steal or manipulate data.
- 16. Piracy - Illegal copying or distribution of software without permission.
- 18. of Service (DoS) Attack - An attack aimed at making a network unavailable by overwhelming it with traffic.
Down
- 1. - Persistent, unwanted surveillance or harassment online.
- 2. Horses - Malicious software disguised as legitimate programs.
- 3. Viruses - Viruses written in macro language that infect files with macros.
- 4. Viruses - A type of virus that changes its own code to avoid detection.
- 6. Warfare - The use of digital attacks between nations or groups to cause harm.
- 8. Terrorism - Using digital means to incite fear or harm on a large scale.
- 10. Hat Hackers - Malicious hackers who break into systems for personal gain.
- 14. Extortion - Demanding ransom through online threats to release or withhold data.
- 15. Sector Viruses - Viruses that infect the boot sector of a storage device.
- 17. Hat Hackers - Ethical hackers who identify and fix vulnerabilities.