Password protected

12345678
Across
  1. 4. is when a criminal obtains personal information and pretends to be someone else to commit their crimes.
  2. 7. to get into someone else's computer system without permission in order to find out information or do something illegal
  3. 8. is short for malicious software and refers to intrusive software that cybercriminals use to steal data or destroy a computer or networked device.
Down
  1. 1. the action, treated as a criminal offense, of demanding payment or another benefit from someone in return for not revealing compromising or damaging information about them.
  2. 2. can take place in several forms and modern technology means that criminals can use various methods to catch their victims off guard
  3. 3. is when a criminal uses fake emails, texts or calls to trick a person into believing they are from a reputable company.
  4. 5. a dishonest plan for making money or getting an advantage, especially one that involves tricking people
  5. 6. is an organized collection of structured information, or data, typically stored electronically in a computer system.