Cyber Fraud

1234567891011121314
Across
  1. 2. Deceitful practices to gain illegal financial advantage.
  2. 4. Pretending to be a trusted source to deceive someone.
  3. 7. Illegal activities conducted using the internet or computers.
  4. 8. Technique to secure data by converting it into unreadable format.
  5. 9. Unauthorized access to computer systems or networks.
  6. 10. Software that secretly monitors user activity.
  7. 11. A unique string of characters used for account protection.
  8. 13. Information that can be stolen or corrupted in a cyber attack.
  9. 14. Malicious software designed to harm or exploit devices.
Down
  1. 1. A type of malware disguised as legitimate software.
  2. 3. A security system that monitors and controls incoming and outgoing network traffic.
  3. 5. A fraudulent attempt to obtain sensitive information through email or messages.
  4. 6. Theft of personal information to commit fraud.
  5. 10. Fraudulent schemes designed to trick and steal money or information.
  6. 12. Malware that locks your data until a payment is made.