Unit 5 - The internet and its uses

1234567891011121314
Across
  1. 2. a cyber security method that is used to examine incoming and outgoing traffic from a computer or network
  2. 3. small text file that is used to store personal data, by a web browser.
  3. 5. the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack.
  4. 9. a type of digital currency that uses encryption procedures.
  5. 11. a network component where the web pages for a website are stored.
  6. 12. a very large global network that allows users to access the world wide web.
  7. 13. the physical structure, such as all the components and cables, that are used to connect devices.
  8. 14. a type of cyber threat that involves sending a user a fake email that is designed to look genuine.
Down
  1. 1. a person that carries out an illegal or immoral action.
  2. 4. a method of securing data for storage or transmission that scrambles it and makes it meaningless.
  3. 5. a type of password that uses a person's biological data, such as their fingerprint.
  4. 6. a software based cyber threat that spies on a user's action whilst using a computer, such as logging their key presses.
  5. 7. a dormant/sleeping bot.
  6. 8. a collection of web pages, normally about a related topic or purpose.
  7. 10. a type of cookie that is stored by the web browser until it is deleted by the user or because it has expired.