Across
- 3. Theft of personal information to impersonate someone else, commit fraud, make unauthorized transactions, or gain access to sensitive accounts.
- 7. Dissemination of malicious software like viruses, ransomware, trojans, or spyware to compromise systems, steal data, or disrupt operations.
- 8. Manipulating individuals through psychological tricks or deception to obtain confidential information, access to systems, or perform unauthorized actions.
- 9. Harassment, threats, or intimidation targeted at individuals using digital platforms like social media, messaging apps, or online forums.
- 10. Overwhelming a target system or network with a flood of traffic to disrupt services, causing downtime and preventing legitimate users from accessing resources.
Down
- 1. Encrypting files or locking down systems and demanding a ransom in exchange for restoring access, often leading to financial loss or data breaches.
- 2. Unauthorized access or exposure of sensitive data stored by organizations, resulting in the compromise of personal, financial, or business information.
- 4. Unauthorized access to computer systems, networks, or data by exploiting vulnerabilities or bypassing security measures.
- 5. Deceptive schemes conducted over the internet to trick individuals or organizations into providing money, goods, or services under false pretenses.
- 6. Deceptive emails, messages, or websites designed to trick individuals into providing sensitive information like passwords, financial details, or personal data.
