Computer Crimes

12345678910111213141516
Across
  1. 1. Breaking into software or systems without permission.
  2. 3. Software that displays unwanted advertisements.
  3. 5. Faking an identity, often for fraudulent purposes.
  4. 7. Attack flooding a system with traffic to disrupt services.
  5. 8. Software that hides malware presence on a system.
  6. 10. Malware disguised as legitimate software.
  7. 12. Software that records keystrokes to capture sensitive data.
  8. 13. Harassment or intimidation using technology.
  9. 14. Redirecting users to fake websites to steal information.
  10. 15. Software designed to damage or disrupt systems.
  11. 16. Malware that replicates itself to spread to other devices.
Down
  1. 1. Deception for personal or financial gain.
  2. 2. Malware that demands payment to restore access.
  3. 4. Unauthorized access to computer systems.
  4. 5. Software that secretly monitors user activity.
  5. 6. Deceptive attempts to acquire sensitive information.
  6. 8. Unauthorized use or reproduction of copyrighted material.
  7. 9. Malware that spreads without user action.
  8. 11. Theft of personal information for fraudulent use.
  9. 14. Network of compromised computers under external control.