CYBERCRIME

123456789101112
Across
  1. 3. (4 letters) – A type of malware that spreads copies of itself from computer to computer.
  2. 4. (6 letters) – A network of computers infected with malware and controlled without the owners’ knowledge.
  3. 5. (7 letters) – The unauthorized access to or manipulation of computer systems
  4. 6. (7 letters) – Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. 9. (10 letters) – A type of malware that demands payment to restore access to encrypted data.
  6. 10. (8 letters) – A technique where an attacker disguises themselves as another user or system to gain access to data or resources.
  7. 12. (8 letters) – Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.
Down
  1. 1. (8 letters) – A network security system that monitors and controls incoming and outgoing traffic.
  2. 2. (6 letters) – A type of malware disguised as legitimate software but is harmful once executed.
  3. 7. (4 letters) – A type of malware that spreads copies of itself from computer to computer.
  4. 8. (10 letters) – The process of converting data into a code to prevent unauthorized access.
  5. 11. (7 letters) – Software that secretly collects information about a person or organization.