Across
- 4. Wrongful or criminal deception intended to result in financial or personal gain.
- 6. Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data.
- 9. A method to hide the actual web address (URL) of a webpage and replace it with another,
- 11. the action or activity of buying goods from shops.
- 13. Importance requiring swift action.
- 16. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- 17. Getting your money back after a purchase.
- 19. A voluntary promise offered by the person or business who sold the product or service to you.
Down
- 1. Made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- 2. Acronym for Two factor Authentication
- 3. An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
- 5. Make an online service unavailable by overwhelming it with excessive traffic from many locations and sources.
- 7. A legally binding agreement between two or more people
- 8. Commonly known as the Scamming Captial of the world.
- 10. The power or right to give orders, make decisions, and enforce obedience.
- 11. The state of being free from danger or threat.
- 12. When cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information.
- 14. A program inserted into a system to compromise the confidentiality, integrity, or availability of data.
- 15. pay someone for the use of (something, typically property, land, or a car).
- 18. designed to trick you into giving away your money or your personal details.
