9.4 Keywords
Across
- 3. spreads between systems.
- 4. malicious program.
- 9. a type of malware that prevents you from accessing your device.
- 10. people use programmes to decode passwords and encryption keys.
- 11. observing someone's personal information over their shoulder.
- 13. updates your computer without you having to do it manually.
- 15. unwanted result due to neglect.
- 17. a sub category of a denial of service attack.
- 18. communicating with someone that you think is real and you can trust.
- 20. information with no meaning.
- 21. monitors and controls incoming and outgoing network traffic.
- 22. an attacker makes it impossible for the user to access their computer.
- 24. perform security assessments.
- 25. another word for 'robot'.
Down
- 1. going into a computer system without permission.
- 2. verifies the identity of a user.
- 5. has meaning.
- 6. uses technology to overcome a technical problem.
- 7. the person asks you to combine some information to create a name for you.
- 8. exploits human error.
- 12. spreads rapidly across devices within a network.
- 14. information that relates to an individual.
- 16. designates the type of access someone has on your computer.
- 19. inventing a story or scenario.
- 23. a type of software or program that protects you from malware.