Across
- 2. Gaining unauthorized access to a computer system or account, often to inflict further damage on the target¹.
- 4. Sextortion The act of threatening to share intimate images of someone unless they meet certain demands².
- 5. The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, credit card numbers, etc².
- 6. Stalking The use of the Internet or other electronic means to stalk or harass an individual, group, or organization².
- 8. Job Fraud The act of scamming individuals with fake job offers².
- 9. Bullying A form of harassment or bullying inflicted through the use of electronic or communication devices².
Down
- 1. Impersonating legitimate companies or individuals to trick users into revealing sensitive information¹.
- 3. Theft Stealing personal data such as names, addresses, and social security numbers to fraudulently assume someone's identity¹.
- 6. Grooming The act of establishing an emotional connection with a child to prepare the child for sexual abuse².
- 7. Spreading malicious software such as viruses, worms, Trojans, and ransomware within a device or network¹.
