INTERNET

12345678
Across
  1. 3. are malicious programs disguised as innocent-looking files or embedded within legitimate software.
  2. 7. or electronic mail for the exchange of messages and attached files.
  3. 8. are computer criminals who use technology to perform a variety of crimes.
Down
  1. 1. Due to its ..., the Internet also provides the right environment for cyberstalking, online harassment or abuse
  2. 2. Internet-based crimes include ...., email fraud to obtain money or valuables, and phishing, bank fraud, to get banking information such as passwords of Internet bank accounts or credit card details.
  3. 4. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software.
  4. 5. are programs that spread by attaching themselves to executable files or documents.
  5. 6. are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.