Unit 5 - The internet and its uses
Across
- 2. a cyber security method that is used to examine incoming and outgoing traffic from a computer or network
- 3. small text file that is used to store personal data, by a web browser.
- 5. the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack.
- 9. a type of digital currency that uses encryption procedures.
- 11. a network component where the web pages for a website are stored.
- 12. a very large global network that allows users to access the world wide web.
- 13. the physical structure, such as all the components and cables, that are used to connect devices.
- 14. a type of cyber threat that involves sending a user a fake email that is designed to look genuine.
Down
- 1. a person that carries out an illegal or immoral action.
- 4. a method of securing data for storage or transmission that scrambles it and makes it meaningless.
- 5. a type of password that uses a person's biological data, such as their fingerprint.
- 6. a software based cyber threat that spies on a user's action whilst using a computer, such as logging their key presses.
- 7. a dormant/sleeping bot.
- 8. a collection of web pages, normally about a related topic or purpose.
- 10. a type of cookie that is stored by the web browser until it is deleted by the user or because it has expired.