cybercrime

1234567891011121314151617181920
Across
  1. 4. - An unauthorized way to access a system.
  2. 6. – A fraudulent scheme, often online, to steal money or information.
  3. 8. – A person who breaks into computer systems.
  4. 9. – Stealing someone's personal information to impersonate them.
  5. 10. – Malware that demands payment to restore access.
  6. 12. – Faking identity or location to deceive.
  7. 14. – Malware disguised as legitimate software.
  8. 15. – Software that secretly collects user information.
  9. 18. – Another term for Trojan malware.
  10. 20. – A network of infected computers controlled remotely.
Down
  1. 1. – Malware that replicates itself to spread across networks.
  2. 2. – Software designed to harm or exploit systems.
  3. 3. – Distributed Denial of Service, an attack that overwhelms a network.
  4. 5. – Using technology to harass or bully someone.
  5. 7. – Software that records keystrokes to capture information.
  6. 11. – Software that automatically displays or downloads ads.
  7. 13. – Security system that monitors and controls network traffic.
  8. 16. – Malicious code that attaches itself to programs and spreads.
  9. 17. – A scam to trick people into giving personal information.
  10. 19. – Process of encoding data to protect it from unauthorized access.