browsing safely

123456
Across
  1. 2. nvolves gaining unauthorized access to computer systems, networks, or data by exploiting vulnerabilities.
  2. 4. often an adult, uses the internet to establish an emotional connection with a child in order to gain their trust
  3. 6. a malicious cyberattack where criminals impersonate legitimate entities, like banks or social media platforms, to trick individuals into revealing sensitive information like passwords, credit card details, or personal data.
Down
  1. 1. a cybersecurity tactic where attackers send emails with a forged sender address, making it appear as if the email originated from a legitimate source.
  2. 3. when someone uses technology to harass, threaten, embarrass, or target another person
  3. 5. that infects a computer system by replicating itself and attaching to other programs or files.