types of cybercrimes

12345678910
Across
  1. 3. Theft of personal information to impersonate someone else, commit fraud, make unauthorized transactions, or gain access to sensitive accounts.
  2. 7. Dissemination of malicious software like viruses, ransomware, trojans, or spyware to compromise systems, steal data, or disrupt operations.
  3. 8. Manipulating individuals through psychological tricks or deception to obtain confidential information, access to systems, or perform unauthorized actions.
  4. 9. Harassment, threats, or intimidation targeted at individuals using digital platforms like social media, messaging apps, or online forums.
  5. 10. Overwhelming a target system or network with a flood of traffic to disrupt services, causing downtime and preventing legitimate users from accessing resources.
Down
  1. 1. Encrypting files or locking down systems and demanding a ransom in exchange for restoring access, often leading to financial loss or data breaches.
  2. 2. Unauthorized access or exposure of sensitive data stored by organizations, resulting in the compromise of personal, financial, or business information.
  3. 4. Unauthorized access to computer systems, networks, or data by exploiting vulnerabilities or bypassing security measures.
  4. 5. Deceptive schemes conducted over the internet to trick individuals or organizations into providing money, goods, or services under false pretenses.
  5. 6. Deceptive emails, messages, or websites designed to trick individuals into providing sensitive information like passwords, financial details, or personal data.