Digital Forensics

1234567891011121314151617
Across
  1. 2. Illegally downloading or distributing movies, music, or software.
  2. 5. Sending emails that appear to come from a trusted source.
  3. 8. Altering or deleting digital files to hide crimes.
  4. 11. Creating fake accounts pretending to be another person.
  5. 12. Repeated online harassment using texts, posts, or images.
  6. 13. Selling fake items or never delivering purchased goods.
  7. 15. Secretly tracking someone’s phone, texts, or location.
  8. 16. Stealing digital wallets or crypto assets.
  9. 17. Using digital tools to harass, threaten, or monitor a victim.
Down
  1. 1. Illegally accessing or monitoring wireless networks.
  2. 3. Using stolen card numbers for online purchases.
  3. 4. Fake emails or messages designed to trick victims into giving login or banking info.
  4. 6. Encrypting a victim’s files and demanding payment to unlock them.
  5. 7. Stealing sensitive data from companies, schools, or government systems.
  6. 9. Stealing personal information to impersonate someone online.
  7. 10. Creating or spreading viruses, spyware, or trojans.
  8. 14. Employees stealing or leaking confidential digital information.