Across
- 1. refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.
- 6. Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.
- 7. These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack
- 8. is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices.
Down
- 2. refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.
- 3. is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.
- 4. theft refers to obtaining or possessing another’s identity and information to commit a legal offense.
- 5. refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization