BTEC DIT Threats
Across
- 1. Fraudulent emails or messages pretending to be from a trusted source to steal personal information.
- 3. Overloading a network or server with traffic to make it unavailable to users.
- 6. Malware that locks or encrypts a user’s data and demands payment to restore access.
- 9. Software designed to damage, disrupt, or gain unauthorised access to a computer system.
- 11. Unauthorised access to data as it is being transmitted across a network.
- 14. Trying many password combinations until the correct one is found.
Down
- 2. Watching someone enter sensitive information such as a password to steal it.
- 4. Software that secretly monitors user activity and collects personal data without consent.
- 5. Techniques used to trick users into revealing sensitive information such as passwords.
- 7. Software that automatically displays unwanted adverts, sometimes tracking user behaviour.
- 8. Redirecting users from a legitimate website to a fake one without their knowledge in order to steal personal information.
- 10. A type of malware that attaches itself to files and spreads when those files are opened. It can corrupt or delete data.
- 12. A self-replicating malware that spreads across networks without needing a host file, often slowing down systems.
- 13. A type of malware disguised as legitimate software that tricks users into installing it, allowing attackers access to the system.