Cyber Crime

Share

Instructions | Edit | Answer Key

T Y C N M C O G J F I Z B M A T E U D H
P Y F K M D I N T E R N E T L I U W L N
Z V N G D D J Y D N D G L P P Y P G D O
T E L L E R H T J I I O S K Q L J N I I
H G L G C R G E G H R C L C Q P G I V T
R N R N C J B W F C R A A A C E N H J A
H I E I A P Q G W A G R N S W R I S R C
Z K B H R P M Y C M U D I H J S H I E I
C N M S D J T O N I W R M U G O S H T F
Y A U I C R A K K K U E I X N N I P S I
B B N V L A M R S Y D A R S I A M Y D T
E A T F O U S N H X D D C Y G L S E U N
R I D E N T I T Y T H E F T G Q G R A E
C J U Q I O S E E Q D R S D O K N K R D
R Z Z K N M V S U X O O O U L V I C F I
I I Z U G A T Q I B K X F A Y A M V A E
M J P N W T P W F N K F O R E Y M A X Y
E W M U J E T S X F K W C F K M I Q Y T
W Q D R T D U V Z P I N C W G X K C Q J
I W Y R J L Z U B N N I H G C W S M D O
cardcloning skimming identitytheft phishing smishing
vishing fraud fraudster cybercrime criminals
keylogging atm cardreader internet pin
personal identification number automated teller
machine cash banking