cyber crime
Across
- 3. - Engineering technique used to manipulate people into revealing confidential information.
- 4. - Software designed to detect and prevent computer viruses and other malware.
- 6. - Type of cyberattack that overwhelms a network with traffic, causing denial of service.
- 10. - Device or software that filters network traffic to block unauthorized access.
- 12. - Encoding information so only authorized parties can access it.
- 14. - Individual or group that hacks for political or social causes.
- 16. - Concealing messages or information within other non-suspicious files.
- 17. - Automated program that performs tasks; can be used in botnets for malicious purposes.
- 18. - Software that allows unauthorized access to a computer while hiding its presence.
- 19. - Software that gathers user information without their knowledge.
Down
- 1. - Hacker who sometimes violates laws or ethical standards without malicious intent.
- 2. - Malicious code that attaches itself to legitimate files and spreads.
- 5. - Malicious software disguised as a legitimate program.
- 6. - Breach exposing sensitive information to unauthorized parties.
- 7. - A software vulnerability that is unknown to the vendor, often exploited by hackers.
- 8. - Measures taken to protect a computer or network from unauthorized access or attack.
- 9. - A hacker who breaks into computer systems with malicious intent.
- 11. - Malware that locks or encrypts files until a ransom is paid.
- 13. - Unwanted and unsolicited messages, usually sent in bulk by email.
- 15. - Software that records keystrokes to capture sensitive information like passwords.