Keywords
Across
- 4. an individual who uses computer, networking or other skills to overcome a technical problem.
- 7. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption.
- 8. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
- 9. facts provided or learned about something or someone
- 10. when someone makes up a story to gain a person's interest and uses this to encourage them to give away information about themselves, or even send money
Down
- 1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- 2. an act or decision which was not intended
- 3. a person who looks over another person's shoulder as they enter data into a computer or another device.
- 5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- 6. facts and statistics collected together for reference or analysis