Cyber Security Risks

123456789
Across
  1. 1. These are small files that your browser saves on your computer that can stay on for months and may even record everywhere you go online.
  2. 3. They are unwanted software that is installed in your system without your consent.
  3. 5. It is a type of program that is installed to collect information about users, their computers or their browsing habits without your knowledge and sends the data to a remote user.
  4. 6. It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid.
  5. 8. It is the unauthorized transmission of data from within an organization to an external destination or recipient.
  6. 9. The practice of sending emails that appears to be from trusted sources with the goal of gaining personal information or influencing the users to do something.
Down
  1. 2. It makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
  2. 4. It is a crime in which an imposter obtains key pieces of personally identifiable information, such as NRIC or driver's license number, in order to impersonate someone else.
  3. 7. The activity of illegally using a computer to access information stored on another computer system or to spread a computer virus.