cybercrime

123456789101112131415161718
Across
  1. 2. Virus or worm code hidden within a seemingly harmless program
  2. 4. Theft Stealing another person’s identity to impersonate them online
  3. 6. Fake messages asking for sensitive information
  4. 8. Protection Protecting children from inappropriate online content
  5. 9. Act of unauthorized copying or using someone's content
  6. 10. Fake sites mimicking real ones to steal information
  7. 14. Passwords, PINs, and fingerprints used for digital security
  8. 15. Protecting data and systems from cyber attacks
  9. 16. Software designed to harm or exploit computers
  10. 17. Common scam emails that trick people into sharing private info
  11. 18. Attacks aimed at disrupting or disabling a network
Down
  1. 1. Financial theft through hacking or scams
  2. 3. Law-breaking activities online
  3. 4. The backbone of online communications targeted by cybercriminals
  4. 5. Method of verifying identity online, often in two steps
  5. 6. Tracking software that monitors user activity without consent
  6. 7. Criminals who exploit security weaknesses online
  7. 11. Testing Breaking into a system to test its defenses legally
  8. 12. Program that spreads across computers, copying itself
  9. 13. Illegal access to systems without permission