Cybersecurity Lesson 5
Across
- 3. gaining unauthorised access to or control of a computer system
- 4. hackers who don’t hack with malicious intent but illegally hack for ethical purposes.
- 6. locks up or encrypts your files so you can no longer access them without paying a ransom.
- 9. hackers who attack others with malicious intent to cause damage and harm.
- 10. involves the attacker watching the victim while they provide sensitive information.
- 11. replicate themselves and spread through the network.
- 12. An attack in which the victim receives an email or text message disguised to look as if it has come from a reputable source.
Down
- 1. Raw facts and figures, with little to no meaning behind them.
- 2. Created when that data has been processed and becomes meaningful.
- 5. malicious form of self-replicating software that attach to software.
- 7. Hackers who hack for the greater good.
- 8. An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.