Cyber Security Crossword

12345678910111213141516171819
Across
  1. 2. a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
  2. 6. digital _____, the information about a person that exists on the Internet as a result of online activity (9)
  3. 8. websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
  4. 10. Tim Berners-Lee's Invention (5,4,3)
  5. 13. __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
  6. 14. Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)
  7. 15. Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
  8. 16. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
  9. 18. The 'mal' part of the term 'malware' (9)
  10. 19. bin where users should send suspicious emails within Anglian Water (4,3)
Down
  1. 1. These people are responsible for security (9)
  2. 3. a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
  3. 4. a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
  4. 5. a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
  5. 7. a person who uses computers to gain unauthorised access to data (6)
  6. 9. the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
  7. 11. the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
  8. 12. (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
  9. 17. Additional copy of data or information used for recovery should the original become lost or corrupt (6)