IGCSE computer science cyber security threats

1234567891011121314
Across
  1. 3. type of malware that does not depend on a users act , and instead look for vulnerability holes in a network to duplicate itself and clog up bandwidth
  2. 4. cyber security threat that examines packets passing through a hardware to intercept them
  3. 6. cyber threat that sends a fake email to the user which encourages the user to click link or respond to the email , providing their personal data to the cyber criminal
  4. 7. cyber threat that involves downloading malicious software onto a users hard drive to re direct the requests sent by the user to a genuine website to a fake website instead
  5. 8. manupilating and deceiving people into providing their personal data
  6. 9. any malicious software designed to disrupt a users data or computer
  7. 12. cyber threat that involves installing malware to many computers to create a bot net to flood a webserver with requests
  8. 13. type of malware downloaded on to a users hardware that gathers certain data and sends them to the third party
  9. 14. type of malware that is downloaded on to the hard drive by user unknowingly and duplicates itself to corrupt data and take up storage space
Down
  1. 1. type of malware that disguises other malware which is released
  2. 2. cyber threat which uses trial and error method to crack a users password and gain access to their personal information
  3. 5. type of malware designed to automatically create pop up adds that can collect personal information
  4. 6. name given to a cyber criminal
  5. 10. type of malware that encrypts a users data and demands a set amount of money to decrypt the data
  6. 11. act of gaining unauthorised access to data .