Across
- 3. Software that is designed to disrupt, damage or gain unathorised access to a computer system
- 6. A type of malware designed for spying on user activity without their knowledge
- 8. A form of malware that holds data hostage, typically encrypting files and demanding that a ransom be paid so that the data can be recovered
- 9. A group of computers, printers and other devices that are interconnected and governed as a whole
- 11. An internet address for your computer, which is identified when communicating over a network
- 12. A defensive technology designed to prevent unauthorised access to a network or system
- 13. A tool that allows users to remain anonymous while using the internet by masking their location and encrypting traffic
Down
- 1. An individual that uses computers to gain unathorised access to data
- 2. A set of programs that tell a computer to perform a task
- 4. The process of encoding data to prevent theft, making it only accessible with a key
- 5. Technology that allows you to access files and services through the internet from anywhere in the world
- 7. A technique used by hackers to try and obtain sensitive information, often through emails
- 10. The moment a hacker successfully gains access to a computer or other device
- 13. A type of malware that aims to corrupt a computer before spreading to others
