ICT Crossword - Leah

1234567891011121314151617181920
Across
  1. 5. a type of malware that disguises itself as legitimate software,it finds personal data and takes over your computer system
  2. 8. the act of identifying and then exploiting weaknesses in a computer system or network
  3. 9. the action of sending text messages to fraudulently obtain another person’s bank details
  4. 10. a virus that replicates itself and destroys data and files on your computer
  5. 14. When a person is employed to work fewer hours than the normal working week
  6. 18. a computer program used to prevent, detect, and remove malware and viruses
  7. 19. a file or code that infects devices maliciously
  8. 20. a protective barrier between you and any other computers that you connect to
Down
  1. 1. Two or more employees doing the same job but working at different times
  2. 2. malware that displays ads on your computer
  3. 3. designed to give hackers access to and control over a target device
  4. 4. Makes phone calls pretending to be a legitimate company in order to steal personal information
  5. 6. a form of malware that locks people out of their files or device and demands money to restore access
  6. 7. When people change their jobs by learning the skills necessary for another job
  7. 11. The action of sending emails to fraudulently obtain another person’s bank details
  8. 12. doing a job at times that suit the worker and not necessarily during the traditional 9am to 5pm hours
  9. 13. a type of virus that tracks your internet activities to steal personal data
  10. 15. Pretends to be a legitimate website to steal passwords and personal data
  11. 16. When an employee works the full normal hours in a week but works fewer days
  12. 17. the use of messaging systems to send unsolicited to large numbers of people