COMPUTER CRIMES

12345678910111213141516171819
Across
  1. 5. (Malware that encrypts data)
  2. 6. Injection (Cyberattack targeting databases)
  3. 10. (Harassment online)
  4. 12. (Denial of Service attack)
  5. 13. (Software that monitors user activity)
  6. 14. (Unauthorized access to computer systems)
  7. 15. Horse (Malicious software disguised as legitimate)
  8. 17. (Redirecting users to fake websites)
  9. 18. (Fraudulent emails to trick users)
  10. 19. (Unsolicited email)
Down
  1. 1. (Harassment online)
  2. 2. (Network of infected computers)
  3. 3. (Distributed Denial of Service attack)
  4. 4. (Illegal copying of copyrighted material)
  5. 6. (Extortion using sexually explicit material)
  6. 7. (Self-replicating malware)
  7. 8. (Malicious software)
  8. 9. (Tricking users into clicking malicious links)
  9. 10. (Illegal activities committed online)
  10. 11. Theft (Stealing personal information)
  11. 16. (Intentional damage to computer systems)