Identity Theft - Group C

12345678910111213
Across
  1. 1. Software created to protect personal information and stop theft.
  2. 3. Someone who finds security holes in technology and uses them for personal use or exploitation.
  3. 7. a secret word or phrase to allow you to enter a website when an account is needed.
  4. 9. fraud Uses personal information that is made up, rather than stolen from another person.
  5. 10. Technology that gathers information on people and organizations without their consent.
  6. 11. a person who commits crimes via technology and through the internet.
  7. 12. Where hackers trick you entering personal credentials and pretend to be legitimate businesses.
  8. 13. Malicious programs that have the ability to self replicate, infect install themselves on technology.
Down
  1. 2. theft When a person steals someone's personal information as their own, creating a new identity of an existing person.
  2. 4. Short for "malicious software" and it refers to any harmful software.
  3. 5. Crimes that are committed over technology and through the internet.
  4. 6. Where hackers redirect internet traffic into another, realistic website to force you to enter your personal credentials.
  5. 8. Irrelevant, continuous and unsolicited emails sent over the internet.
  6. 10. deceptive schemes to tricks to chest someone out of something or to force them into giving you something.