cybercrime

1234567891011121314151617181920
Across
  1. 6. Testing Breaking into a system to test its defenses legally
  2. 8. Attacks aimed at disrupting or disabling a network
  3. 9. Financial theft through hacking or scams
  4. 12. Protecting data and systems from cyber attacks
  5. 14. Virus or worm code hidden within a seemingly harmless program
  6. 15. Common scam emails that trick people into sharing private info
  7. 17. Passwords, PINs, and fingerprints used for digital security
  8. 19. Illegal access to systems without permission
  9. 20. Fake sites mimicking real ones to steal information
Down
  1. 1. Software designed to harm or exploit computers
  2. 2. Law-breaking activities online
  3. 3. Tracking software that monitors user activity without consent
  4. 4. Protecting children from inappropriate online content
  5. 5. Method of verifying identity online, often in two steps
  6. 7. Theft Stealing another person’s identity to impersonate them online
  7. 10. The backbone of online communications targeted by cybercriminals
  8. 11. Program that spreads across computers, copying itself
  9. 13. Fake messages asking for sensitive information
  10. 16. Act of unauthorized copying or using someone's content
  11. 18. Criminals who exploit security weaknesses online