GC-CYBERSECURITY
Across
- 2. A piece of malicious code that encrypts files so the user can not access them until they pay.
- 6. A piece of malicious code that is downloaded by pretending to be a useful piece of code
- 7. Malicious code can be transferred from one computer to another using physical devices such as a _ _ _ _ _ _ _ _
- 8. Old software and hardware may contain vulnerabilities that a hacker can e _ _ _ _ _ _ to gain access to a device.
- 9. A piece of malicious code used to damage computers or steal data
- 10. A hacker intercepts and steals data.
- 11. Emails sent that appear to come from a legitimate organisation but links within the mail may install malicious code.
Down
- 1. hackers attempt every posiible combination of characters to find a password
- 3. A piece of malicious code. It infects computers by being downloaded within files.
- 4. social ____________. Manipulating users into sharing their data.
- 5. A common way to infect a computer with malicious code is to _ _ _ _ _ _ it from the internet or by clicking on suspicious links in mail.