Across
- 2. Emails pretending to be from trusted sources to steal information.
- 7. An attack where criminals demand money to restore access to data.
- 8. Type of hacker paid to test security systems ethically.
- 9. Attack that floods a system with traffic to bring it down.
Down
- 1. A trick where a criminal looks over your shoulder to steal information.
- 3. The unauthorised use of someone’s private information to pretend to be them.
- 4. Software that replicates itself and can damage files or systems.
- 5. Law passed in 1990 to deal with hacking offences.
- 6. Security method requiring both a password and a text code.
- 10. Personal facts and figures collected online.
