D1: threat to data

123456789101112131415
Across
  1. 3. (5 letters) : Crime where someone uses another person’s identity or data to get money, loans or goods dishonestly.
  2. 5. (7 letters) : Software designed to damage a computer or steal data, such as viruses or spyware.
  3. 7. (4 letters) : Malware that spreads itself across networks using security holes, often to steal data or create botnets.
  4. 9. (8 letters) : Scam email or message pretending to be from a trusted source to trick people into giving personal data.
  5. 11. (8 letters) : Protecting data so it is not stolen, misused or deliberately / accidentally destroyed.
  6. 13. (6 letters) : Group of infected “zombie” devices controlled together to send spam or launch DDoS attacks.
  7. 14. (10 letters) : Unplanned events, like dropping a laptop or spilling a drink, that cause damage or data loss.
Down
  1. 1. (6 letters) : Person who breaks into computer systems, sometimes illegally, to steal data or cause damage.
  2. 2. (4 letters) : Attack where many systems flood a website with traffic so it slows down or becomes unavailable.
  3. 4. (10 letters) : Malware that encrypts files and demands payment to unlock or restore access to them.
  4. 6. (6 letters) : Malicious program hidden inside something that looks genuine or useful, which can harm a system once run.
  5. 8. (5 letters) : Small program that attaches to files or programs, replicates, and can damage or steal data.
  6. 10. (7 letters) : Software that secretly monitors a user’s activity, such as keystrokes and websites visited, to steal information.
  7. 12. (8 letters) : A person’s key personal details (name, date of birth, address, etc.) that can be used to pretend to be them.
  8. 13. (6 letters) : Incident where data is accessed, stolen or exposed without permission.
  9. 15. (9 letters) : Keeping data accurate and complete so it is not wrongly changed or lost.