Threats to Cyber Secruity

123456789101112131415
Across
  1. 4. Shoulder surfing, direct observation techniques like looking over a shoulder
  2. 8. Scamming practise where malicious code is installed on to a personal computer record are modified and misdirects users to fraudulent websites
  3. 9. The art of manipulating people so they give up their personal information
  4. 11. Appears to be something wanted but is a standalone malicious software designed to give full control of the PC
  5. 12. Spyware that logs keys used and collets data from affected computer
  6. 13. Encourages users to enter confidential data by pretending to be a trust worthy source
  7. 15. Usually popups, main aim to generate revenue for author
Down
  1. 1. Types of malware installed on computer system that collects information without user being aware, is hidden and secretly installed
  2. 2. Self-replicating program that attaches onto to existing programs and can easily spread
  3. 3. The acts of using and creating an invented scenario to engage victim into giving the information
  4. 5. Making the computer or network unavailable to user (DoS)
  5. 6. Loss or theft of devices
  6. 7. The term to describe the protection of information systems from theft unauthorised access or damage to hardware, software and information on them
  7. 10. Standalone computer program that replicates itself so it can spread onto a network. Does NOT attach to a program
  8. 14. Finding a weakness in an established system