malware

123456789101112
Across
  1. 4. Grooming is when someone builds your trust and makes a connection with you to get you to do something sexual or illegal.
  2. 6. irrelevant or unsolicited messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
  3. 8. unsolicited mail that consists mainly of promotional materials, catalogs, and requests for donations
  4. 9. the fraudulent practice of directing internet users to a bogus website that mimics the appearance of a legitimate one,
  5. 10. the fraudulent practice of sending emails or other messages purporting to be from reputable companies
  6. 12. Trolling is when someone post or comments online to deliberately upset others.
Down
  1. 1. In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program.
  2. 2. An active digital footprint is where the user has deliberately shared information about themselves
  3. 3. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  4. 5. Catfishing is when someone sets up a fake online profile to trick people who are looking for love, usually to get money out of them
  5. 7. gain unauthorized access to data in a system or computer.
  6. 11. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.