Cyber Security
Across
- 5. This is when someone spends irrelevant or unsolicited messages to loads of people
- 7. This is a software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
- 9. This is when your speaking to someone and another person is watching/listening without the person knowing
- 10. Loads of private computers that can see what your doing without the users knowing
- 11. Something that can go onto your computer and can destroy data and corrupt the system
Down
- 1. This is when someone takes your personal info and uses it to take your credit card etc
- 2. These are physical parts you can connect to a system
- 3. This is a person who uses computers to gain unauthorized access to data
- 4. This is a software that threatens to delete your data for a specific amount of money
- 5. This is a program or a set of instructions
- 6. This a secret word or phrase that must be used to gain access to a place/website
- 8. This is software designed to detect and destroy computer viruses