IGCSE computer science cyber security threats
Across
- 3. type of malware that does not depend on a users act , and instead look for vulnerability holes in a network to duplicate itself and clog up bandwidth
- 4. cyber security threat that examines packets passing through a hardware to intercept them
- 6. cyber threat that sends a fake email to the user which encourages the user to click link or respond to the email , providing their personal data to the cyber criminal
- 7. cyber threat that involves downloading malicious software onto a users hard drive to re direct the requests sent by the user to a genuine website to a fake website instead
- 8. manupilating and deceiving people into providing their personal data
- 9. any malicious software designed to disrupt a users data or computer
- 12. cyber threat that involves installing malware to many computers to create a bot net to flood a webserver with requests
- 13. type of malware downloaded on to a users hardware that gathers certain data and sends them to the third party
- 14. type of malware that is downloaded on to the hard drive by user unknowingly and duplicates itself to corrupt data and take up storage space
Down
- 1. type of malware that disguises other malware which is released
- 2. cyber threat which uses trial and error method to crack a users password and gain access to their personal information
- 5. type of malware designed to automatically create pop up adds that can collect personal information
- 6. name given to a cyber criminal
- 10. type of malware that encrypts a users data and demands a set amount of money to decrypt the data
- 11. act of gaining unauthorised access to data .