BTEC DIT Threats

1234567891011121314
Across
  1. 1. Fraudulent emails or messages pretending to be from a trusted source to steal personal information.
  2. 3. Overloading a network or server with traffic to make it unavailable to users.
  3. 6. Malware that locks or encrypts a user’s data and demands payment to restore access.
  4. 9. Software designed to damage, disrupt, or gain unauthorised access to a computer system.
  5. 11. Unauthorised access to data as it is being transmitted across a network.
  6. 14. Trying many password combinations until the correct one is found.
Down
  1. 2. Watching someone enter sensitive information such as a password to steal it.
  2. 4. Software that secretly monitors user activity and collects personal data without consent.
  3. 5. Techniques used to trick users into revealing sensitive information such as passwords.
  4. 7. Software that automatically displays unwanted adverts, sometimes tracking user behaviour.
  5. 8. Redirecting users from a legitimate website to a fake one without their knowledge in order to steal personal information.
  6. 10. A type of malware that attaches itself to files and spreads when those files are opened. It can corrupt or delete data.
  7. 12. A self-replicating malware that spreads across networks without needing a host file, often slowing down systems.
  8. 13. A type of malware disguised as legitimate software that tricks users into installing it, allowing attackers access to the system.