Cybersecurity (year 09)
Across
- 4. an attack involving an email designed to look official
- 6. people who are paid to legally hack into computer systems
- 8. malware that collects info about the user and sends it back to criminals
- 10. Manipulating people to get their personal information
- 11. attacker watches their victim to get sensitive information
- 13. malware that hides in legitimate software
Down
- 1. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
- 2. attack where the criminal tries to maintain a conversation with the victim
- 3. kind of access Computer Misuse Act protects from
- 5. Law that looks after your data
- 7. type of malware that encrypts your data until you pay
- 9. checks incoming and outgoing network traffic
- 12. attack done by flooding a website with lots of requests