Across
- 2. A type of malware that secretly monitors a user.
- 6. Malware that encrypts files and demands payment for decryption.
- 8. The process of scrambling data so it can only be read by authorised users.
- 11. Unauthorised access of data as it is being transmitted over a network.
- 12. A form of testing designed to find any weaknesses in a system.
- 14. Overloading a network or website with traffic to make it unavailable.
- 15. A malicious program that disguises itself as legitimate software.
- 17. A technique that exploits vulnerabilities in databases by injecting malicious code.
- 18. Should be at least 8 characters long with upper and lowercase letters.
Down
- 1. A form of social engineering that involves maintaining a conversation.
- 2. Manipulating people into sharing sensitive/confidential information.
- 3. A malicious program that replicates itself and attaches itself to files.
- 4. Permissions assigned to a user defining what resources they can access.
- 5. A self-replicating malware that spreads itself across networks, without user action.
- 7. A form of social engineering that involves tricking people into sharing information through fake emails or websites.
- 9. Attempting to guess passwords by trying every possible combination.
- 10. A term for malicious software.
- 13. Observing someone's action, such as watching them enter their password.
- 16. Software or hardware that filters and blocks unauthorised access to a network.
