Cybersecurity Week Crossword

123456789101112131415
Across
  1. 3. A small file from a website that tracks your actions
  2. 4. Malicious software that prevents access to a system until a ransom is paid
  3. 6. A website used to attract hackers, without risking corporate data
  4. 7. Bulk or unwanted emails
  5. 8. Software to disrupt, damage or gain unauthorised access to a computer system
  6. 9. Occurs when an unauthorised person bypasses access control measures for a restricted area by being granted access through an authorised user, who subjects themselves to the access control measures
  7. 11. A person that has the potential to or causes actual damage to an organisation through using their authorized access to systems
  8. 14. Practice of granting required access to authorized persons based on job requirements
  9. 15. Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
Down
  1. 1. A person who uses computers to gain unauthorized access to data
  2. 2. A technique used to disguise the sender's identity to gain sensitive information
  3. 5. Method of exploiting social interactions that trick users to reveal sensitive information to gain access to a system
  4. 9. A form of social engineering that is done via email or other messages
  5. 10. Sofware that automatically displays advertisements
  6. 12. Publishing someone's personal information online without their consent
  7. 13. A combination of username, password or biometrics to authenticate access a system