Hacking and Viruses
Across
- 3. The physical parts of a computer.
- 4. Type of email that is sent without the user asking for it. Can be used for phishing.
- 6. Tricking someone into giving personal information.
- 8. Software used to cause damage. Can be spread.
- 9. When should you click on a link in an email?
- 10. Person who tries to gain unauthorised access to a network.
Down
- 1. The programs that run on a computer.
- 2. Trying to gain access to a network without permission.
- 5. Type of software used to protect a computer from malicious software.
- 7. Type of software used to restrict access to a computer or network.