Cybersecurity
Across
- 3. Make sure you set a strong one by using upper, lowercase, numbers and characters
- 6. Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles
- 7. Common messaging platform for attackers to use for cyberattacks
- 8. An attempt to obtain sensitive information such as usernames, passwords etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
- 9. Type of cyberattack that uses malware disguised as a legitimate file to infect a system or device. Named by a famous wooden horse
Down
- 1. Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
- 2. Cyber-attackers use creative ways to trick you to enable them to steal it
- 4. Type of cyber-attack that uses multiple computers or devices to send overwhelming traffic to a targeted website or network. The attack aims to cause the target to slow down or completely stop functioning
- 5. Form of malware that poses a security program. If clicked, it pretends to scan for threats and malware on your PC and then lures you into paying real money in exchange for resolving the imaginary threat