Year 10 Summer 2025 Revision
Across
- 1. when attackers send scam emails (or text messages) that contain links to malicious websites
- 7. Going against the law of a country or jurisdiction
- 8. Tricking people into revealing confidential information, like passwords or PINs.
- 10. helps prevent bots from overwhelming websites by creating fake accounts or posting spam.
- 11. A biometric scan used in place of a password
Down
- 2. Copying a game from a website free that you should be paying for
- 3. After entering your password, you might need to enter a code sent to your phone
- 4. The practices and technologies used to protect systems, networks, programs, and data from cyber attacks and unauthorized access
- 5. a type of cyberattack where scammers use phone calls or voice messages to trick individuals into revealing sensitive information
- 6. The gaining of unauthorised access to data in a system or computer.
- 9. An intellectual property right that protects original creative works, granting the author exclusive control over how their work is used