Computer Crimes

1234567891011121314151617
Across
  1. 3. Redirecting users to fake websites to steal information.
  2. 4. Deception for personal or financial gain.
  3. 6. Malware that replicates itself to spread to other devices.
  4. 9. Breaking into software or systems without permission.
  5. 11. Network of compromised computers under external control.
  6. 12. Software that records keystrokes to capture sensitive data.
  7. 13. Unauthorized use or reproduction of copyrighted material.
  8. 14. Malware that spreads without user action.
  9. 15. Malware that demands payment to restore access.
  10. 17. Harassment or intimidation using technology.
Down
  1. 1. Deceptive attempts to acquire sensitive information.
  2. 2. Faking an identity, often for fraudulent purposes.
  3. 3. Attack flooding a system with traffic to disrupt services.
  4. 5. Software that hides malware presence on a system.
  5. 7. Unauthorized access to computer systems.
  6. 8. Software that displays unwanted advertisements.
  7. 10. Malware disguised as legitimate software.
  8. 12. Software designed to damage or disrupt systems.
  9. 13. Software that secretly monitors user activity.
  10. 16. Theft of personal information for fraudulent use.