Cyber Security
Across
- 3. Type of software used to cause damage, e.g. viruses.
- 5. A small piece of software designed to cause damage.
- 7. Part of the Internet hidden behind logins, etc.
- 8. Part of the Internet that can be accessed using a search engine.
- 9. A way of jumbling up data so it is unreadable.
- 10. A simple (and very old) method of encryption where the alphabet is shifted.
- 12. Type of hacker who legally hacks, often to test networks.
- 15. A way of convincing people to give up personal information.
- 16. Describes criminals stealing personal information to impersonate someone.
- 17. Type of hacker who commits illegal actions but for the greater good.
Down
- 1. Using the Internet (often social media) to target someone negatively.
- 2. A way of strengthening logins by sending a code to a phone or email.
- 4. Convincing users to give up personal information, often using emails.
- 6. Part of the Internet that is unmonitored and often contains illegal content.
- 11. A simple (and very old) method of encrypting data by rotating the alphabet.
- 13. French dude who invented a complex grid-based encryption method. Begins with a V.
- 14. Type of hacker that commits illegal actions.