cybercrime
Across
- 2. Virus or worm code hidden within a seemingly harmless program
- 4. Theft Stealing another person’s identity to impersonate them online
- 6. Fake messages asking for sensitive information
- 8. Protection Protecting children from inappropriate online content
- 9. Act of unauthorized copying or using someone's content
- 10. Fake sites mimicking real ones to steal information
- 14. Passwords, PINs, and fingerprints used for digital security
- 15. Protecting data and systems from cyber attacks
- 16. Software designed to harm or exploit computers
- 17. Common scam emails that trick people into sharing private info
- 18. Attacks aimed at disrupting or disabling a network
Down
- 1. Financial theft through hacking or scams
- 3. Law-breaking activities online
- 4. The backbone of online communications targeted by cybercriminals
- 5. Method of verifying identity online, often in two steps
- 6. Tracking software that monitors user activity without consent
- 7. Criminals who exploit security weaknesses online
- 11. Testing Breaking into a system to test its defenses legally
- 12. Program that spreads across computers, copying itself
- 13. Illegal access to systems without permission