9.4 Keywords

12345678910111213141516171819202122232425
Across
  1. 3. spreads between systems.
  2. 4. malicious program.
  3. 9. a type of malware that prevents you from accessing your device.
  4. 10. people use programmes to decode passwords and encryption keys.
  5. 11. observing someone's personal information over their shoulder.
  6. 13. updates your computer without you having to do it manually.
  7. 15. unwanted result due to neglect.
  8. 17. a sub category of a denial of service attack.
  9. 18. communicating with someone that you think is real and you can trust.
  10. 20. information with no meaning.
  11. 21. monitors and controls incoming and outgoing network traffic.
  12. 22. an attacker makes it impossible for the user to access their computer.
  13. 24. perform security assessments.
  14. 25. another word for 'robot'.
Down
  1. 1. going into a computer system without permission.
  2. 2. verifies the identity of a user.
  3. 5. has meaning.
  4. 6. uses technology to overcome a technical problem.
  5. 7. the person asks you to combine some information to create a name for you.
  6. 8. exploits human error.
  7. 12. spreads rapidly across devices within a network.
  8. 14. information that relates to an individual.
  9. 16. designates the type of access someone has on your computer.
  10. 19. inventing a story or scenario.
  11. 23. a type of software or program that protects you from malware.