CAM 2025 Challenge

1234567891011121314151617
Across
  1. 7. A type of cyber attack that targets a specific individual or group.
  2. 9. Always use long and unique _____ for each of your accounts.
  3. 10. Malware that infects a computer by corrupting or erasing information and sending it to hackers.
  4. 11. A set of rules that control access to a network.
  5. 13. A person who breaks into system
  6. 16. A type of malware that replicates itself to spread.
  7. 17. A type of cyber attack that tricks people into giving up information.
Down
  1. 1. A technique used to guess passwords by trying many combinations
  2. 2. A security flaw in software or hardware.
  3. 3. A type of attack that floods a website with traffic.
  4. 4. This sends an email or text when logging in to make sure it is really you.
  5. 5. A person inside an organisation who poses a security threat.
  6. 6. Identity check using physical traits.
  7. 8. A type of software that locks your files and demands payment.
  8. 12. A small file that tracks your activity on websites.
  9. 14. Unwanted emails or junk mail
  10. 15. Private network to make you anonymous on the internet.