Across
- 4. a scam that asks the user to call a nunmber to confirm their personal information
- 5. malware that appears to be a harmless piece of software but its really a malicious virus.
- 6. where the criminal takes another persons identity
- 8. a program that infects and encrypts everything on a users device
- 10. tricking someone into giving their personal information
- 13. retrieves evidence from computers even if they've been deleted or erased
- 15. malware that can monitor and record user activities on a computer or mobile device.
- 16. crime used to gain money , services and other information
- 18. hackers send fake txts to get your personal information
- 19. a set of computers all on one network with a virus that is controlled by a hacker
- 20. fake websites that get your personal and financial information
Down
- 1. who receives all the identity theft cases and complaints
- 2. hackers send fake emails trying to get your personal information
- 3. software on a computer that keeps viruses from attacking your computer
- 7. trace viruses and hacking attacks
- 9. use their skills to demonstrate vulnerabilities and improvements to security
- 11. unauthorized access to a computer system
- 12. attacks that shutdown websites
- 14. a cpu worm that finds and infects a certain piece of industrial hardware
- 17. filter out content from untrusted websites and devices