Cyber Security

12345678910
Across
  1. 3. D______ of service
  2. 5. P_________ mails that try to trick users into giving away personal details.
  3. 7. Programs similar to viruses except that they are not hidden within other files
  4. 8. M_______ is malicious software that is designed to hack a system
  5. 9. Programs that monitor user activities (such as websites visited, usernames and passwords used)
  6. 10. B_____ force Where a program is used to find a password
Down
  1. 1. P______ - Where users do not adhere to network policy.
  2. 2. Programs that attempt to blackmail a user into making a payment to a hacker.
  3. 4. Programs embedded (hidden) within other files. They replicate themselves and become part of other programs.
  4. 6. Programs which pretend to be legitimate but in reality are malware.