Computer Crime and Cyber Security (KS3)

123456789101112131415161718192021222324252627282930
Across
  1. 4. This type of attack tries to crack a password by checking words from a dictionary.
  2. 6. The way you sit, which can affect your back health when using computers.
  3. 8. Obtaining personal information, like passwords, by looking over someone's shoulder.
  4. 12. A legal framework in the UK that protects personal information, updated in 2018.
  5. 14. A boolean value representing logical false (from starter activity).
  6. 17. An error in the program's thinking that causes unexpected results, even if it runs.
  7. 20. This type of email scam tries to trick you into revealing personal information like login details.
  8. 23. A problem that can arise from looking at screens for too long.
  9. 24. This scam promises large sums of money but requires an upfront payment.
  10. 25. A specific type of malicious software disguised as a legitimate program.
  11. 27. A type of malware that is able to replicate itself.
  12. 28. Malicious software.
  13. 30. A condition caused by repeating the same actions over and over, making it painful to type or use a mouse.
Down
  1. 1. When files are scrambled and unreadable, often by ransomware.
  2. 2. Legal protection for the owner of a creative work from illegal copying.
  3. 3. Secret words or phrases used to protect accounts and systems.
  4. 5. Information directly linked to a person, like their name or mobile number.
  5. 7. Accessing a computer system or files without permission.
  6. 9. The act of illegally accessing a computer or data without permission.
  7. 10. The organisation in the UK responsible for data protection.
  8. 11. Files sent with an email, which can sometimes contain malware.
  9. 13. A type of fire extinguisher safe for electrical fires.
  10. 15. This type of attack attempts to guess a password by trying every single combination.
  11. 16. Copying someone else's work and presenting it as your own.
  12. 18. Malware that encrypts files and demands payment for the decryption key.
  13. 19. Penalties that can be issued for serious copyright offences or data breaches.
  14. 21. Storing a copy of data to restore from if original files are lost or encrypted.
  15. 22. The process of finding and fixing errors in code.
  16. 26. Unwanted or junk email.
  17. 29. An emotion expressed by the word "Blimey".