Cybercrime

123456789101112131415161718192021222324252627282930
Across
  1. 3. Manipulating people into divulging personal or confidential information is known as ________ engineering
  2. 7. Digital story
  3. 8. In 2014, North Korean hackers demanded _______ Pictures withdraw The Interview
  4. 9. Black-and-white twistable treat
  5. 11. A tool that cloaks devices, for short
  6. 13. Scams designed to trick you into giving sensitive information
  7. 15. _______ of data
  8. 17. Short, rude
  9. 19. Hidden sites (two words)
  10. 21. Sweet Bobby is the longest ___________ case in the history of the internet
  11. 24. ______ phishing attacks are a more focused version
  12. 25. Malicious software, for short
  13. 26. A distinctive smell
  14. 28. Creator of the first computer virus in 1988
  15. 29. “Before” in old English
  16. 30. Business email compromise, for short
Down
  1. 1. Hackers attacking corporations or governments for political, competitive, or financial reasons is cyber _________
  2. 2. Two-_______ authentication
  3. 4. ______-day exploit, or none
  4. 5. Denial of _______ attack
  5. 6. Person, place, or thing
  6. 10. To encode information
  7. 12. Used to block cyberattacks
  8. 14. _______ Madison website data breach
  9. 16. Theft that involves stealing your personal information
  10. 18. Cybercriminal (hacker)
  11. 20. Malicious software that demands money
  12. 22. Criminals pretending to be a legitimate business
  13. 23. A strong one can prevent data breaches
  14. 27. Flightless bird