cybercrime
Across
- 6. Testing Breaking into a system to test its defenses legally
- 8. Attacks aimed at disrupting or disabling a network
- 9. Financial theft through hacking or scams
- 12. Protecting data and systems from cyber attacks
- 14. Virus or worm code hidden within a seemingly harmless program
- 15. Common scam emails that trick people into sharing private info
- 17. Passwords, PINs, and fingerprints used for digital security
- 19. Illegal access to systems without permission
- 20. Fake sites mimicking real ones to steal information
Down
- 1. Software designed to harm or exploit computers
- 2. Law-breaking activities online
- 3. Tracking software that monitors user activity without consent
- 4. Protecting children from inappropriate online content
- 5. Method of verifying identity online, often in two steps
- 7. Theft Stealing another person’s identity to impersonate them online
- 10. The backbone of online communications targeted by cybercriminals
- 11. Program that spreads across computers, copying itself
- 13. Fake messages asking for sensitive information
- 16. Act of unauthorized copying or using someone's content
- 18. Criminals who exploit security weaknesses online