cyber crime

12345678910111213141516171819
Across
  1. 3. - Engineering technique used to manipulate people into revealing confidential information.
  2. 4. - Software designed to detect and prevent computer viruses and other malware.
  3. 6. - Type of cyberattack that overwhelms a network with traffic, causing denial of service.
  4. 10. - Device or software that filters network traffic to block unauthorized access.
  5. 12. - Encoding information so only authorized parties can access it.
  6. 14. - Individual or group that hacks for political or social causes.
  7. 16. - Concealing messages or information within other non-suspicious files.
  8. 17. - Automated program that performs tasks; can be used in botnets for malicious purposes.
  9. 18. - Software that allows unauthorized access to a computer while hiding its presence.
  10. 19. - Software that gathers user information without their knowledge.
Down
  1. 1. - Hacker who sometimes violates laws or ethical standards without malicious intent.
  2. 2. - Malicious code that attaches itself to legitimate files and spreads.
  3. 5. - Malicious software disguised as a legitimate program.
  4. 6. - Breach exposing sensitive information to unauthorized parties.
  5. 7. - A software vulnerability that is unknown to the vendor, often exploited by hackers.
  6. 8. - Measures taken to protect a computer or network from unauthorized access or attack.
  7. 9. - A hacker who breaks into computer systems with malicious intent.
  8. 11. - Malware that locks or encrypts files until a ransom is paid.
  9. 13. - Unwanted and unsolicited messages, usually sent in bulk by email.
  10. 15. - Software that records keystrokes to capture sensitive information like passwords.