Across
- 4. gaining illegal or unauthorized access to a file, computer or network.
- 6. When hackers threaten or harm a website, server, or a computer system using denial of service (DOS)
- 7. Spamming It refers to the use of electronic messaging systems to send unsolicited messages to users
- 8. attack to commit a Cyber Crime can be called as a Cyber Attack
- 9. crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data
- 10. The process of making, adapting, or imitating objects, statistics, or documents, with the intent to deceive
Down
- 1. E-mail fishing for personal and financial information disguised as legitimate business e-mail
- 2. False websites that fish for personal and financial information by planting false URLs in Domain Name Users
- 3. Theft It is one of the most serious frauds as it involves stealing money and obtaining other benefits with the use of a false identity
- 5. as actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.
