Across
- 4. This type of attack tries to crack a password by checking words from a dictionary.
- 6. The way you sit, which can affect your back health when using computers.
- 8. Obtaining personal information, like passwords, by looking over someone's shoulder.
- 12. A legal framework in the UK that protects personal information, updated in 2018.
- 14. A boolean value representing logical false (from starter activity).
- 17. An error in the program's thinking that causes unexpected results, even if it runs.
- 20. This type of email scam tries to trick you into revealing personal information like login details.
- 23. A problem that can arise from looking at screens for too long.
- 24. This scam promises large sums of money but requires an upfront payment.
- 25. A specific type of malicious software disguised as a legitimate program.
- 27. A type of malware that is able to replicate itself.
- 28. Malicious software.
- 30. A condition caused by repeating the same actions over and over, making it painful to type or use a mouse.
Down
- 1. When files are scrambled and unreadable, often by ransomware.
- 2. Legal protection for the owner of a creative work from illegal copying.
- 3. Secret words or phrases used to protect accounts and systems.
- 5. Information directly linked to a person, like their name or mobile number.
- 7. Accessing a computer system or files without permission.
- 9. The act of illegally accessing a computer or data without permission.
- 10. The organisation in the UK responsible for data protection.
- 11. Files sent with an email, which can sometimes contain malware.
- 13. A type of fire extinguisher safe for electrical fires.
- 15. This type of attack attempts to guess a password by trying every single combination.
- 16. Copying someone else's work and presenting it as your own.
- 18. Malware that encrypts files and demands payment for the decryption key.
- 19. Penalties that can be issued for serious copyright offences or data breaches.
- 21. Storing a copy of data to restore from if original files are lost or encrypted.
- 22. The process of finding and fixing errors in code.
- 26. Unwanted or junk email.
- 29. An emotion expressed by the word "Blimey".
