Cybersecurity Lesson 5

123456789101112
Across
  1. 3. gaining unauthorised access to or control of a computer system
  2. 4. hackers who don’t hack with malicious intent but illegally hack for ethical purposes.
  3. 6. locks up or encrypts your files so you can no longer access them without paying a ransom.
  4. 9. hackers who attack others with malicious intent to cause damage and harm.
  5. 10. involves the attacker watching the victim while they provide sensitive information.
  6. 11. replicate themselves and spread through the network.
  7. 12. An attack in which the victim receives an email or text message disguised to look as if it has come from a reputable source.
Down
  1. 1. Raw facts and figures, with little to no meaning behind them.
  2. 2. Created when that data has been processed and becomes meaningful.
  3. 5. malicious form of self-replicating software that attach to software.
  4. 7. Hackers who hack for the greater good.
  5. 8. An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.