Cyber security crossword
Across
- 4. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, or credit card details, by pretending to be a trustworthy entity, often via email or fake websites.
- 5. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Examples include viruses, worms, and ransomware.
- 7. The practices and technologies used to protect websites, users, and data from cyber threats such as hacking, malware, and phishing attacks.
Down
- 1. A cyberattack where users are directed to a fake website that looks like a legitimate one in order to steal personal information, such as login credentials or financial data.
- 2. Online platforms (such as Facebook, Instagram, and Twitter) where users can create content, share information, and connect with others.
- 3. Unwanted, unsolicited messages, usually sent in bulk through email, advertising products or services, or containing links to malicious sites.
- 6. The act of gaining unauthorized access to computer systems or networks, often with malicious intent, such as stealing data or causing disruption.