Cyber Crime

123456789101112131415161718
Across
  1. 5. It is the part of the malware program that actually executes its designed task
  2. 6. It is a form of social engineering carried out in electronic form, usually by email, with the purpose of gathering sensitive information.
  3. 7. It is simply unsolicited email, also known as junk email
  4. 11. It is a security barrier designed to keep unwanted intruders “outside” a computer system or network while allowing safe communication between systems and users
  5. 13. A non-malicious surprise contained in a program or on a circuit board installed by the developer
  6. 14. It is someone who breaks into a computer system or network without authorization and with the intention of doing damage
  7. 16. It is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there
  8. 17. It is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network
  9. 18. It is a non-destructive program that is designed to log every keystroke made on a computer
Down
  1. 1. It is the art of misdirection
  2. 2. The act of rummaging through the trash of an individual or business to gather information that could be useful for a cyber-criminal to gain access to a system or attain personal information to aid them in identity theft or system intrusion
  3. 3. It includes viruses, Trojans, worms, time bombs, logic bombs, or anything else intended to cause damage upon the execution of the payload
  4. 4. It is used to track a user’s Internet surfing habits for advertising purposes in an effort to match user's interests with relevant ads
  5. 8. It is a malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems
  6. 9. It is a software designed to force pre-chosen ads to display on your system
  7. 10. It is a small packet of information from a visited webserver stored on your system by your computer’s browser to store personalized information in order to customize your next visit
  8. 12. It is a malicious program designed to execute when a certain criterion is met.
  9. 15. It is a software “robot” that performs an extensive set of automated tasks on its own