Computer criminals - types and what they do/how they operate

12345678910
Across
  1. 4. gaining illegal or unauthorized access to a file, computer or network.
  2. 6. When hackers threaten or harm a website, server, or a computer system using denial of service (DOS)
  3. 7. Spamming It refers to the use of electronic messaging systems to send unsolicited messages to users
  4. 8. attack to commit a Cyber Crime can be called as a Cyber Attack
  5. 9. crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data
  6. 10. The process of making, adapting, or imitating objects, statistics, or documents, with the intent to deceive
Down
  1. 1. E-mail fishing for personal and financial information disguised as legitimate business e-mail
  2. 2. False websites that fish for personal and financial information by planting false URLs in Domain Name Users
  3. 3. Theft It is one of the most serious frauds as it involves stealing money and obtaining other benefits with the use of a false identity
  4. 5. as actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.