Across
- 5. The data we leave behind when we use in internet
- 6. Any criminal activity intended to harm anyone using computer and an internet connection
- 11. It is referred to the act of stealing and misusing someone's personal information
- 12. A collection of technology to protect networks and data from an unauthorized access
- 13. It is a program or set of programs that disrupt the normal functioning of a computer
- 14. Known as crackers
Down
- 1. A crime in which the victim is attacked first and then forced to pay money to stop further attack
- 2. used to conduct terrorism through the use of computers and internet
- 3. Referred to an illegal entry into a computer system or network
- 4. The process befriending with children on social media to continue online or physical sexual abuse
- 7. illegal method to get money or other things that belong to a bank or its customers
- 8. Example of a antivirus
- 9. The receiver of a messages fold into believing at the message is received by him is from trusted source which is actually not true
- 10. Ethical hackers
- 15. A computer program that is designed to identify, prevent and remove virus from a computer
