Cyber Crossword

12345678910111213
Across
  1. 3. Software that is designed to disrupt, damage or gain unathorised access to a computer system
  2. 6. A type of malware designed for spying on user activity without their knowledge
  3. 8. A form of malware that holds data hostage, typically encrypting files and demanding that a ransom be paid so that the data can be recovered
  4. 9. A group of computers, printers and other devices that are interconnected and governed as a whole
  5. 11. An internet address for your computer, which is identified when communicating over a network
  6. 12. A defensive technology designed to prevent unauthorised access to a network or system
  7. 13. A tool that allows users to remain anonymous while using the internet by masking their location and encrypting traffic
Down
  1. 1. An individual that uses computers to gain unathorised access to data
  2. 2. A set of programs that tell a computer to perform a task
  3. 4. The process of encoding data to prevent theft, making it only accessible with a key
  4. 5. Technology that allows you to access files and services through the internet from anywhere in the world
  5. 7. A technique used by hackers to try and obtain sensitive information, often through emails
  6. 10. The moment a hacker successfully gains access to a computer or other device
  7. 13. A type of malware that aims to corrupt a computer before spreading to others