Tech and Cyber Crime Mysteries
Across
- 4. An ethical hacker who helps organizations improve security
- 6. Any program designed to damage or gain unauthorized access
- 9. Hyper-realistic synthetic media used for deception
- 14. The practice of recovering and analyzing electronic evidence
- 15. Digital tokens often demanded as ransom payments
- 16. Unauthorized exposure of login credentials
- 18. A code injection exploit targeting databases
- 19. Security system monitoring incoming and outgoing network traffic
Down
- 1. The process of scrambling data to prevent unauthorized access
- 2. A program secretly recording every keystroke typed
- 3. Malicious software that locks files until payment is made
- 5. Someone who breaks into computer systems for illicit or ethical reasons
- 7. Overwhelming a target server with excessive traffic
- 8. A cyberattack requiring no user interaction to gain entry
- 9. A hidden network often used for illegal transactions
- 10. A deceptive attempt to steal personal details via email or messaging
- 11. Harmful code hidden inside otherwise legitimate software
- 12. A criminal hacker seeking personal gain or causing harm
- 13. Stealing personal info to commit fraud or other crimes
- 17. A network of compromised devices controlled remotely