Cyber Crim

1234567891011121314151617181920
Across
  1. 1. These are Internet-based programs that are used to software or disrupt a network.
  2. 6. Act by the criminal, who floods the bandwidth of the victim’s network.
  3. 10. is a malicious program that appears to be friendly, they are not technically viruses
  4. 12. Refers to all the activities done with criminal intent in cyberspace.
  5. 14. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to steal money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
  6. 15. This category of cybercrime involves one individual distributing malicious or illegal information online.
  7. 17. these viruses take up residence in the computer’s memory, making them hard to detect.
  8. 19. Occurs website, e-mail server, when a or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers.
  9. 20. This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography
Down
  1. 2. Theft of software through the illegal copying of genuine programs.
  2. 3. This is similar to a real-life instance of a criminal illegally possessing an individual’s bank or credit card details.
  3. 4. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing, etc.)
  4. 5. In simple terms means an illegal intrusion into a computer system and/or network.
  5. 7. this type of virus make changes to a disk’s file
  6. 8. The first recorded cybercrime took place in the year 1820.
  7. 9. Damaging or destroying than stealing.
  8. 11. a virus designed to infect a specific type of document file, such as Microsoft Word or Excel files
  9. 13. This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.
  10. 16. In general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources.
  11. 18. this type of virus hides the user’s disk and waits for a specific event to occur before running.