Tech and Cyber Crime Mysteries

12345678910111213141516171819
Across
  1. 4. An ethical hacker who helps organizations improve security
  2. 6. Any program designed to damage or gain unauthorized access
  3. 9. Hyper-realistic synthetic media used for deception
  4. 14. The practice of recovering and analyzing electronic evidence
  5. 15. Digital tokens often demanded as ransom payments
  6. 16. Unauthorized exposure of login credentials
  7. 18. A code injection exploit targeting databases
  8. 19. Security system monitoring incoming and outgoing network traffic
Down
  1. 1. The process of scrambling data to prevent unauthorized access
  2. 2. A program secretly recording every keystroke typed
  3. 3. Malicious software that locks files until payment is made
  4. 5. Someone who breaks into computer systems for illicit or ethical reasons
  5. 7. Overwhelming a target server with excessive traffic
  6. 8. A cyberattack requiring no user interaction to gain entry
  7. 9. A hidden network often used for illegal transactions
  8. 10. A deceptive attempt to steal personal details via email or messaging
  9. 11. Harmful code hidden inside otherwise legitimate software
  10. 12. A criminal hacker seeking personal gain or causing harm
  11. 13. Stealing personal info to commit fraud or other crimes
  12. 17. A network of compromised devices controlled remotely