Computer Crimes

1234567891011121314151617181920
Across
  1. 3. Spreading lies about someone online is a form of cyber___.
  2. 6. When a website is overloaded with requests, a Denial of ___ attack may have occurred.
  3. 8. Some cybercriminals wish to ___ online services to cause inconvenience to users.
  4. 9. Even if someone hacks a website out of ___, they have still committed a crime.
  5. 12. The purpose of scams is to persuade people to transfer ___ to the scammers.
  6. 13. E-commerce scams can be in the form of someone selling bogus ___ to a concert.
  7. 14. Hacking is gaining ___ access to a computer.
  8. 15. If someone intimidates or ___ a victim online, it is cyberbullying.
  9. 17. One reason why crimes are committed: to cause ___.
  10. 18. Defacing or ___ websites is a form of hacking.
  11. 20. Some criminals want to steal ___ information or secrets.
Down
  1. 1. A software that stores keystrokes entered by a user.
  2. 2. Hackers may install ___ software in a computer after gaining access.
  3. 4. Targets of cybercriminals include individuals, businesses and ___.
  4. 5. Some whatsapp messages appear to be ___ but they may be scams.
  5. 7. Trying to steal sensitive information through emails.
  6. 10. A victim of cyberbullying may suffer from this.
  7. 11. In a ___ friend scam, someone pretends to be your friend to get sensitive information from you.
  8. 16. Victims of cybercrime should report the matter to a figure of ___.
  9. 19. Avoid clicking on suspicious ___ to win prizes.