Across
- 4. Software that encrypts a computers programs and data until a ransom is paid.
- 11. When criminals offer a service in exchange for details.
- 12. Watching a user enter a password or security code.
- 13. When a user pretends to be another user in order to steal another user's personal data.
- 14. When criminals offer free goods or services in return for details,such as offering a free membership.
Down
- 1. Advertising supported software. Any software that shows adverts, including popups. Sometimes it can be harmless or it can include spyware.
- 2. A virus that bores its way through a computer;s files or a network.
- 3. A virus that appears to be a program that actually is harmful and allows information to be stolen.
- 5. An online scam that targets the user's address bar, so that when they believe they are entering a valid website, it is actually illegitimate and steals the user's information.
- 6. Gaining entry to a secured building by following another person through the door once it opens.
- 7. A program that hides in a computer and allows someone from a remote location to control the computer.
- 8. An attempt at getting a user to input their details so they can be stolen.
- 9. A piece of code that is capable of copying itself, that typically is harmful to a user and their computer
- 10. A collection of captured bot computers
- 14. An error in a program that prevents the program from running as it is expected to.
