Across
- 3. Redirecting users to fake websites to steal information.
- 4. Deception for personal or financial gain.
- 6. Malware that replicates itself to spread to other devices.
- 9. Breaking into software or systems without permission.
- 11. Network of compromised computers under external control.
- 12. Software that records keystrokes to capture sensitive data.
- 13. Unauthorized use or reproduction of copyrighted material.
- 14. Malware that spreads without user action.
- 15. Malware that demands payment to restore access.
- 17. Harassment or intimidation using technology.
Down
- 1. Deceptive attempts to acquire sensitive information.
- 2. Faking an identity, often for fraudulent purposes.
- 3. Attack flooding a system with traffic to disrupt services.
- 5. Software that hides malware presence on a system.
- 7. Unauthorized access to computer systems.
- 8. Software that displays unwanted advertisements.
- 10. Malware disguised as legitimate software.
- 12. Software designed to damage or disrupt systems.
- 13. Software that secretly monitors user activity.
- 16. Theft of personal information for fraudulent use.
