Cyber Security

123456789101112131415
Across
  1. 2. Gaining unauthorised access to or control of a computer system.
  2. 3. A self replicating malware that modifies code and programs.
  3. 5. A group or person who is interested in creating disruptions or embarrassment through hacking.
  4. 7. An attack where the perpetrator invents a story to convince the victim into providing money or data.
  5. 9. ________ is created when data is processed and meaningful.
  6. 10. Malware that infects a computer and spams the user with adds.
  7. 12. Automated programs that perform tasks repeatedly.
  8. 14. Multiple computers send packets or data to a system in an attempt to overload the network.
  9. 15. ____ is raw fact and figures.
Down
  1. 1. An attack where the victim receives and email disguised to resemble an official email.
  2. 4. An attack where the attacker is watching the victim while they provide sensitive information.
  3. 6. a form of virus that encrypts users data and requests payments to decrypt the data.
  4. 8. A large collection of malware infected devices called zombies.
  5. 11. A self replicating malware that spreads through the networks and uses system resources.
  6. 13. A piece of malware that disguises itself to appear as a useful program.