Across
- 1. offering computer repair, network troubleshooting, and IT support services to make money illegally.
- 3. Unsolicited bulk messages from unfamiliar organizations, companies, and groups are sent to large numbers of users
- 7. cybercriminals make a direct contact with you through phone calls, emails, or even in person.
- 9. steal personal data, including passwords, data about the bank account, credit cards, debit cards, social security, and other sensitive information to steal money
Down
- 2. are malicious software to gain unauthorized access to systems and steal important data.
- 4. use email spoofing to extract confidential information such as credit card numbers, social security number
- 5. Controlled by remote attackers called - bot herders
- 6. Encrypts files and information through public-key encryption and asks for money for unlocking it
- 8. temporarily or completely interrupts servers and networks that are successfully running to make the website unavailable
- 10. partial or complete acquisition of important data and information, breaching privacy.
