Across
- 2. nvolves gaining unauthorized access to computer systems, networks, or data by exploiting vulnerabilities.
- 4. often an adult, uses the internet to establish an emotional connection with a child in order to gain their trust
- 6. a malicious cyberattack where criminals impersonate legitimate entities, like banks or social media platforms, to trick individuals into revealing sensitive information like passwords, credit card details, or personal data.
Down
- 1. a cybersecurity tactic where attackers send emails with a forged sender address, making it appear as if the email originated from a legitimate source.
- 3. when someone uses technology to harass, threaten, embarrass, or target another person
- 5. that infects a computer system by replicating itself and attaching to other programs or files.
