Across
- 4. (Illegal copying of copyrighted material)
- 7. (Self-replicating malware)
- 9. (Denial of Service attack)
- 10. (Tricking users into clicking malicious links)
- 12. (Malicious software)
- 13. (Harassment online)
- 14. (Unsolicited email)
- 15. (Illegal activities committed online)
- 17. (Software that monitors user activity)
- 19. (Intentional damage to computer systems)
Down
- 1. (Redirecting users to fake websites)
- 2. (Unauthorized access to computer systems)
- 3. Horse (Malicious software disguised as legitimate)
- 5. (Malware that encrypts data)
- 6. Injection (Cyberattack targeting databases)
- 8. (Distributed Denial of Service attack)
- 11. Theft (Stealing personal information)
- 14. (Extortion using sexually explicit material)
- 16. (Network of infected computers)
- 18. (Fraudulent emails to trick users)
