Cyber Security Crossword

12345678910111213141516171819
Across
  1. 2. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
  2. 6. Tim Berners-Lee's Invention (5,4,3)
  3. 10. Additional copy of data or information used for recovery should the original become lost or corrupt (6)
  4. 11. a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
  5. 12. The 'mal' part of the term 'malware' (9)
  6. 15. a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
  7. 16. Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
  8. 18. a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
  9. 19. bin where users should send suspicious emails within Anglian Water (4,3)
Down
  1. 1. digital _____, the information about a person that exists on the Internet as a result of online activity (9)
  2. 3. a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
  3. 4. websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
  4. 5. the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
  5. 7. the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
  6. 8. These people are responsible for security (9)
  7. 9. (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
  8. 13. __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
  9. 14. a person who uses computers to gain unauthorised access to data (6)
  10. 17. Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)