Cyber Security Keywords (for revision)

123456789101112131415161718192021222324
Across
  1. 2. The most basic way of protecting your data.
  2. 6. An old method of encoding data. Very easy to break.
  3. 8. Describes fooling people into giving away personal information.
  4. 10. A way of protecting an account by requiring the user to enter a code sent to an email address or mobile phone.
  5. 12. Using online services to send nasty messages to people.
  6. 14. Turning data into an unreadable form, often using a key, so others can't understand it.
  7. 15. Word to describe using manipulation and other skills to fool people into believing you're someone you say you are.
  8. 17. Describes unwanted emails, often sent to many people.
  9. 18. Type of website that pretends to be from another company.
  10. 21. WERXEGPEYW has been encoded using Caesar Cipher by moving between 2 and 5 places.
  11. 22. A type of hacker who commits illegal activity.
  12. 23. Sending so many requests to a server, it stops other people accessing it.
  13. 24. Software used to restrict access to a network.
Down
  1. 1. Collecting personal data in order to pretend to be someone else.
  2. 3. A type of hacker who hacks illegally but for greater good.
  3. 4. Informal term to describe something that is trying to steal from you.
  4. 5. A type of hacker who legally hacks.
  5. 7. Following someone online for a period of time, often posting messages in order to upset them.
  6. 9. Someone who gains access to a network by using a range of tools and weaknesses.
  7. 11. Type of software that can be used to avoid viruses.
  8. 13. Describes being on the look out for cyber security risks.
  9. 16. Someone who spends so long playing games it affects their well-being might be suffering from this.
  10. 19. Software used to cause damage or to allow a hacker to gain access to a system.
  11. 20. Type of software that can be used to avoid malware.