Across
- 5. (Malware that encrypts data)
- 6. Injection (Cyberattack targeting databases)
- 10. (Harassment online)
- 12. (Denial of Service attack)
- 13. (Software that monitors user activity)
- 14. (Unauthorized access to computer systems)
- 15. Horse (Malicious software disguised as legitimate)
- 17. (Redirecting users to fake websites)
- 18. (Fraudulent emails to trick users)
- 19. (Unsolicited email)
Down
- 1. (Harassment online)
- 2. (Network of infected computers)
- 3. (Distributed Denial of Service attack)
- 4. (Illegal copying of copyrighted material)
- 6. (Extortion using sexually explicit material)
- 7. (Self-replicating malware)
- 8. (Malicious software)
- 9. (Tricking users into clicking malicious links)
- 10. (Illegal activities committed online)
- 11. Theft (Stealing personal information)
- 16. (Intentional damage to computer systems)
