Cyber Security

1234567891011121314151617
Across
  1. 3. Type of software used to cause damage, e.g. viruses.
  2. 5. A small piece of software designed to cause damage.
  3. 7. Part of the Internet hidden behind logins, etc.
  4. 8. Part of the Internet that can be accessed using a search engine.
  5. 9. A way of jumbling up data so it is unreadable.
  6. 10. A simple (and very old) method of encryption where the alphabet is shifted.
  7. 12. Type of hacker who legally hacks, often to test networks.
  8. 15. A way of convincing people to give up personal information.
  9. 16. Describes criminals stealing personal information to impersonate someone.
  10. 17. Type of hacker who commits illegal actions but for the greater good.
Down
  1. 1. Using the Internet (often social media) to target someone negatively.
  2. 2. A way of strengthening logins by sending a code to a phone or email.
  3. 4. Convincing users to give up personal information, often using emails.
  4. 6. Part of the Internet that is unmonitored and often contains illegal content.
  5. 11. A simple (and very old) method of encrypting data by rotating the alphabet.
  6. 13. French dude who invented a complex grid-based encryption method. Begins with a V.
  7. 14. Type of hacker that commits illegal actions.