Computer crime

123456789101112131415161718
Across
  1. 1. Viruses - Viruses that affect multiple locations on a computer to make it harder to detect.
  2. 5. Software - Any program designed to damage or disrupt systems.
  3. 7. - Deceitful practices used to gain financial or personal information.
  4. 8. Soliciting and Abuse - Using online means to exploit minors.
  5. 9. Terrorism - Cyberattacks meant to create widespread fear or panic.
  6. 11. Theft - Stealing personal data to impersonate someone for malicious purposes.
  7. 12. - One of the main entities targeted in categorization of cybercrime.
  8. 13. - Unauthorized access to computer systems to steal or manipulate data.
  9. 16. Piracy - Illegal copying or distribution of software without permission.
  10. 18. of Service (DoS) Attack - An attack aimed at making a network unavailable by overwhelming it with traffic.
Down
  1. 1. - Persistent, unwanted surveillance or harassment online.
  2. 2. Horses - Malicious software disguised as legitimate programs.
  3. 3. Viruses - Viruses written in macro language that infect files with macros.
  4. 4. Viruses - A type of virus that changes its own code to avoid detection.
  5. 6. Warfare - The use of digital attacks between nations or groups to cause harm.
  6. 8. Terrorism - Using digital means to incite fear or harm on a large scale.
  7. 10. Hat Hackers - Malicious hackers who break into systems for personal gain.
  8. 14. Extortion - Demanding ransom through online threats to release or withhold data.
  9. 15. Sector Viruses - Viruses that infect the boot sector of a storage device.
  10. 17. Hat Hackers - Ethical hackers who identify and fix vulnerabilities.