Icon New game New game

Cybercrime

Crossword Puzzle

Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may threaten a person, company or a nation's security and financial health.

Download the paper version to play

Recommended age: 14 years old
24 times made

Created by

United States

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Crossword Puzzle

CybercrimeOnline version

Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may threaten a person, company or a nation's security and financial health.

by Ben Crenshaw
1

Psychological manipulation of people into performing actions or divulging confidential information.

2

The ability of a resource to be accessed, often expressed as a time period.

3

Determining the identity or location of an attacker or an attacker’s intermediary.

4

type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid

5

an attack where the attacker disguises himself or herself as another user by means of a false IP network address

6

method by which information is converted into secret code that hides the information's true meaning

7

A crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

8

A politically- or ideologically-motivated cyber attack or hack

9

the process of taking over a live connection between two users so that the attacker can masquerade as one of the users

10

gaining unauthorized access to a computer system via another user's legitimate connection

11

Amassed data that is used to describe large amounts of other Internet data

12

Type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

13

a device designed to enforce the boundary between two or more networks, limiting access

14

term used to describe a hacker who has the intention of causing damage or stealing information

15

a private network used within a company or organization that is not connected to the Internet

16

a program designed to capture information across a computer network

17

a data string used to verify the identity of a user

18

networks from compromised computers that are controlled externally by remote hackers.

19

An information packet sent from a website to a web browser that records a user’s activity on that website.

20

A program that masks something harmful, such as a worm or virus, that it carries into a device.

21

Computer Incident Response Team

22

a computer system that resides on a network and can independently communicate with other systems on the network

23

A software robot that performs automated tasks.

7
10
20
5
6
21
19
12
2
18
22
11
13
15
14
16
1
23
9
17
educaplay suscripción