Cyber Security Crossword
Across
- 2. a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
- 6. digital _____, the information about a person that exists on the Internet as a result of online activity (9)
- 8. websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
- 10. Tim Berners-Lee's Invention (5,4,3)
- 13. __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
- 14. Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)
- 15. Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
- 16. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
- 18. The 'mal' part of the term 'malware' (9)
- 19. bin where users should send suspicious emails within Anglian Water (4,3)
Down
- 1. These people are responsible for security (9)
- 3. a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
- 4. a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
- 5. a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
- 7. a person who uses computers to gain unauthorised access to data (6)
- 9. the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
- 11. the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
- 12. (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
- 17. Additional copy of data or information used for recovery should the original become lost or corrupt (6)