Keywords

12345678910
Across
  1. 4. an individual who uses computer, networking or other skills to overcome a technical problem.
  2. 7. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption.
  3. 8. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
  4. 9. facts provided or learned about something or someone
  5. 10. when someone makes up a story to gain a person's interest and uses this to encourage them to give away information about themselves, or even send money
Down
  1. 1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  2. 2. an act or decision which was not intended
  3. 3. a person who looks over another person's shoulder as they enter data into a computer or another device.
  4. 5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  5. 6. facts and statistics collected together for reference or analysis