Across
- 2. Deceitful practices to gain illegal financial advantage.
- 4. Pretending to be a trusted source to deceive someone.
- 7. Illegal activities conducted using the internet or computers.
- 8. Technique to secure data by converting it into unreadable format.
- 9. Unauthorized access to computer systems or networks.
- 10. Software that secretly monitors user activity.
- 11. A unique string of characters used for account protection.
- 13. Information that can be stolen or corrupted in a cyber attack.
- 14. Malicious software designed to harm or exploit devices.
Down
- 1. A type of malware disguised as legitimate software.
- 3. A security system that monitors and controls incoming and outgoing network traffic.
- 5. A fraudulent attempt to obtain sensitive information through email or messages.
- 6. Theft of personal information to commit fraud.
- 10. Fraudulent schemes designed to trick and steal money or information.
- 12. Malware that locks your data until a payment is made.
