Across
- 3. are malicious programs disguised as innocent-looking files or embedded within legitimate software.
- 7. or electronic mail for the exchange of messages and attached files.
- 8. are computer criminals who use technology to perform a variety of crimes.
Down
- 1. Due to its ..., the Internet also provides the right environment for cyberstalking, online harassment or abuse
- 2. Internet-based crimes include ...., email fraud to obtain money or valuables, and phishing, bank fraud, to get banking information such as passwords of Internet bank accounts or credit card details.
- 4. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software.
- 5. are programs that spread by attaching themselves to executable files or documents.
- 6. are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.
