Across
- 4. false Debit and Credit cards used by criminals for their monetary benefits
- 5. changing data prior or during input into a computer
- 8. breaking into your computer systems without your knowledge and consent
- 10. deceive large number of persons by sending threatening mails
- 12. software that takes control of any individual’s computer to spread a bug to other people’s devices
- 14. act of imputing any person with intent to lower down the dignity
- 15. taking control of computers without the users realizing it
Down
- 1. unauthorized control/access over computer system
- 2. cyber attack through voice calls
- 3. cyber attack through emails
- 6. Vital Information Resources Under Seize
- 7. computer program that replicates itself in order to spread to other computers.
- 9. politically motivated hacking to conduct sabotage and espionage
- 11. substitution of the original home page of a website with another page
- 13. selling the pirated software in physical media
