Computer Crimes

12345678910111213141516
Across
  1. 3. Redirecting users to fake websites to steal information.
  2. 6. Software that displays unwanted advertisements.
  3. 8. Unauthorized use or reproduction of copyrighted material.
  4. 9. Malware that spreads without user action.
  5. 10. Software that records keystrokes to capture sensitive data.
  6. 11. Deception for personal or financial gain.
  7. 12. Malware that replicates itself to spread to other devices.
  8. 13. Malware disguised as legitimate software.
  9. 14. Unauthorized access to computer systems.
  10. 15. Network of compromised computers under external control.
  11. 16. Software that secretly monitors user activity.
Down
  1. 1. Breaking into software or systems without permission.
  2. 2. Deceptive attempts to acquire sensitive information.
  3. 4. Software that hides malware presence on a system.
  4. 5. Malware that demands payment to restore access.
  5. 6. Harassment or intimidation using technology.
  6. 7. Faking an identity, often for fraudulent purposes.
  7. 8. Attack flooding a system with traffic to disrupt services.
  8. 12. Software designed to damage or disrupt systems.
  9. 13. Theft of personal information for fraudulent use.