cyber crime

1234567891011121314151617181920
Across
  1. 4. - A secret string of characters used for authentication.
  2. 5. - Part of the internet that requires special software to access, often associated with illicit activities.
  3. 7. - Server that acts as an intermediary for requests from clients seeking resources from other servers.
  4. 9. - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  5. 10. - Engineering technique that tricks people into giving away confidential information.
  6. 12. - Collection of computers and devices connected for communication and resource sharing.
  7. 14. - Technique of disguising communication from an unknown source as being from a known, trusted source.
  8. 15. - Software update to fix bugs or vulnerabilities (same as Across).
  9. 17. - A security system that controls incoming and outgoing network traffic.
  10. 19. - A deceptive scheme intended to cheat or defraud someone.
Down
  1. 1. - Person who gains unauthorized access to computer systems.
  2. 2. - Software that gathers information from a computer without permission.
  3. 3. - A software update that fixes vulnerabilities or improves functionality.
  4. 6. - A software tool designed to take advantage of a security flaw.
  5. 8. - Money demanded by hackers in exchange for access to compromised data.
  6. 11. - Software that automatically displays or downloads advertising material.
  7. 13. - Malicious software that gives unauthorized access to a computer system.
  8. 16. - Malicious code that infects computer files and spreads to others.
  9. 18. - A type of malware that spreads copies of itself across networks.
  10. 20. - Prefix related to computers or computer networks.