cybercrime

1234567891011121314151617181920
Across
  1. 5. – Software that automatically displays or downloads ads.
  2. 6. – Malware that replicates itself to spread across networks.
  3. 7. – Software that records keystrokes to capture information.
  4. 9. – Malicious code that attaches itself to programs and spreads.
  5. 13. – Faking identity or location to deceive.
  6. 15. - An unauthorized way to access a system.
  7. 16. – Process of encoding data to protect it from unauthorized access.
  8. 19. – Software designed to harm or exploit systems.
  9. 20. – Stealing someone's personal information to impersonate them.
Down
  1. 1. – Another term for Trojan malware.
  2. 2. – Malware that demands payment to restore access.
  3. 3. – Using technology to harass or bully someone.
  4. 4. – A fraudulent scheme, often online, to steal money or information.
  5. 8. – Security system that monitors and controls network traffic.
  6. 10. – Software that secretly collects user information.
  7. 11. – Distributed Denial of Service, an attack that overwhelms a network.
  8. 12. – Malware disguised as legitimate software.
  9. 14. – A person who breaks into computer systems.
  10. 17. – A scam to trick people into giving personal information.
  11. 18. – A network of infected computers controlled remotely.