Across
- 3. Redirecting users to fake websites to steal information.
- 6. Software that displays unwanted advertisements.
- 8. Unauthorized use or reproduction of copyrighted material.
- 9. Malware that spreads without user action.
- 10. Software that records keystrokes to capture sensitive data.
- 11. Deception for personal or financial gain.
- 12. Malware that replicates itself to spread to other devices.
- 13. Malware disguised as legitimate software.
- 14. Unauthorized access to computer systems.
- 15. Network of compromised computers under external control.
- 16. Software that secretly monitors user activity.
Down
- 1. Breaking into software or systems without permission.
- 2. Deceptive attempts to acquire sensitive information.
- 4. Software that hides malware presence on a system.
- 5. Malware that demands payment to restore access.
- 6. Harassment or intimidation using technology.
- 7. Faking an identity, often for fraudulent purposes.
- 8. Attack flooding a system with traffic to disrupt services.
- 12. Software designed to damage or disrupt systems.
- 13. Theft of personal information for fraudulent use.
