Across
- 4. (Denial of Service attack)
- 7. (Harassment online)
- 8. (Intentional damage to computer systems)
- 10. (Illegal copying of copyrighted material)
- 11. (Network of infected computers)
- 13. (Illegal activities committed online)
- 14. (Extortion using sexually explicit material)
- 15. (Unsolicited email)
- 16. Theft (Stealing personal information)
- 18. (Unauthorized access to computer systems)
- 19. (Self-replicating malware)
Down
- 1. (Malicious software)
- 2. Injection (Cyberattack targeting databases)
- 3. (Tricking users into clicking malicious links)
- 5. (Software that monitors user activity)
- 6. (Malware that encrypts data)
- 7. (Harassment online)
- 9. (Fraudulent emails to trick users)
- 10. (Redirecting users to fake websites)
- 12. Horse (Malicious software disguised as legitimate)
- 17. (Distributed Denial of Service attack)
