Commerce Cybersecurity

12345678910111213141516171819
Across
  1. 4. Wrongful or criminal deception intended to result in financial or personal gain.
  2. 6. Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data.
  3. 9. A method to hide the actual web address (URL) of a webpage and replace it with another,
  4. 11. the action or activity of buying goods from shops.
  5. 13. Importance requiring swift action.
  6. 16. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
  7. 17. Getting your money back after a purchase.
  8. 19. A voluntary promise offered by the person or business who sold the product or service to you.
Down
  1. 1. Made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  2. 2. Acronym for Two factor Authentication
  3. 3. An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
  4. 5. Make an online service unavailable by overwhelming it with excessive traffic from many locations and sources.
  5. 7. A legally binding agreement between two or more people
  6. 8. Commonly known as the Scamming Captial of the world.
  7. 10. The power or right to give orders, make decisions, and enforce obedience.
  8. 11. The state of being free from danger or threat.
  9. 12. When cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information.
  10. 14. A program inserted into a system to compromise the confidentiality, integrity, or availability of data.
  11. 15. pay someone for the use of (something, typically property, land, or a car).
  12. 18. designed to trick you into giving away your money or your personal details.