Cyber Attackers

12345678910
Across
  1. 2. Emails pretending to be from trusted sources to steal information.
  2. 7. An attack where criminals demand money to restore access to data.
  3. 8. Type of hacker paid to test security systems ethically.
  4. 9. Attack that floods a system with traffic to bring it down.
Down
  1. 1. A trick where a criminal looks over your shoulder to steal information.
  2. 3. The unauthorised use of someone’s private information to pretend to be them.
  3. 4. Software that replicates itself and can damage files or systems.
  4. 5. Law passed in 1990 to deal with hacking offences.
  5. 6. Security method requiring both a password and a text code.
  6. 10. Personal facts and figures collected online.