Computer Crimes
Across
- 3. Spreading lies about someone online is a form of cyber___.
- 6. When a website is overloaded with requests, a Denial of ___ attack may have occurred.
- 8. Some cybercriminals wish to ___ online services to cause inconvenience to users.
- 9. Even if someone hacks a website out of ___, they have still committed a crime.
- 12. The purpose of scams is to persuade people to transfer ___ to the scammers.
- 13. E-commerce scams can be in the form of someone selling bogus ___ to a concert.
- 14. Hacking is gaining ___ access to a computer.
- 15. If someone intimidates or ___ a victim online, it is cyberbullying.
- 17. One reason why crimes are committed: to cause ___.
- 18. Defacing or ___ websites is a form of hacking.
- 20. Some criminals want to steal ___ information or secrets.
Down
- 1. A software that stores keystrokes entered by a user.
- 2. Hackers may install ___ software in a computer after gaining access.
- 4. Targets of cybercriminals include individuals, businesses and ___.
- 5. Some whatsapp messages appear to be ___ but they may be scams.
- 7. Trying to steal sensitive information through emails.
- 10. A victim of cyberbullying may suffer from this.
- 11. In a ___ friend scam, someone pretends to be your friend to get sensitive information from you.
- 16. Victims of cybercrime should report the matter to a figure of ___.
- 19. Avoid clicking on suspicious ___ to win prizes.