Across
- 3. (Harassment online)
- 4. Injection (Cyberattack targeting databases)
- 6. (Software that monitors user activity)
- 9. (Distributed Denial of Service attack)
- 10. (Malware that encrypts data)
- 12. (Unauthorized access to computer systems)
- 13. (Fraudulent emails to trick users)
- 16. Horse (Malicious software disguised as legitimate)
- 17. (Malicious software)
- 18. (Extortion using sexually explicit material)
Down
- 1. (Denial of Service attack)
- 2. (Illegal copying of copyrighted material)
- 3. (Tricking users into clicking malicious links)
- 5. (Illegal activities committed online)
- 7. Theft (Stealing personal information)
- 8. (Self-replicating malware)
- 11. (Intentional damage to computer systems)
- 13. (Redirecting users to fake websites)
- 14. (Unsolicited email)
- 15. (Network of infected computers)
