ICT - Revision (May)
Across
- 2. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
- 6. to checks incoming and outgoing network traffic.
- 8. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- 9. unwanted software that monitors and gathers information on a person and how they use their computer.
- 11. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
Down
- 1. an attack designed to steal a victim's password or other sensitive data.
- 3. a hostname that refers to the current computer used to access it.
- 4. software that is designed to gain access to your computer with malicious intent.
- 5. a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
- 7. ______________is the practice of protecting systems, networks, and programs from digital attacks
- 10. malicious form of self-replicating software.