Across
- 2. To convert data into a code to prevent unauthorized access
- 6. To obtain something, typically money, through force or threats
- 7. Measures implemented to protect against cyber threats
- 12. A score assigned to an individual indicating their creditworthiness.
- 14. Not asked for
- 15. Individuals or entities who suffer harm or loss due to cybercrime.
Down
- 1. Software that secretly gathers information about a user's activities without their knowledge.
- 3. an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks
- 4. A person who uses computers to gain unauthorized access to data
- 5. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 8. A fraudulent scheme performed by an individual or group.
- 9. Deceitful or dishonest behavior for personal gain.
- 10. An action that harms others or is against the law
- 11. Money demanded for the release of captive data or system access
- 13. An organized collection of data stored and accessed electronically
