Cyber Security Risks
Across
- 1. These are small files that your browser saves on your computer that can stay on for months and may even record everywhere you go online.
- 3. They are unwanted software that is installed in your system without your consent.
- 5. It is a type of program that is installed to collect information about users, their computers or their browsing habits without your knowledge and sends the data to a remote user.
- 6. It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid.
- 8. It is the unauthorized transmission of data from within an organization to an external destination or recipient.
- 9. The practice of sending emails that appears to be from trusted sources with the goal of gaining personal information or influencing the users to do something.
Down
- 2. It makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
- 4. It is a crime in which an imposter obtains key pieces of personally identifiable information, such as NRIC or driver's license number, in order to impersonate someone else.
- 7. The activity of illegally using a computer to access information stored on another computer system or to spread a computer virus.