Across
- 8. This type of malware logs every keystroke a user makes. (10)
- 9. Nasty software that can have a bad impact on your device or computer. (7)
- 11. A sequence of characters (or words) used to stop criminals from accessing your accounts. (8)
- 12. This week. (5, 8, 4)
- 13. This type of malware disguises itself as desirable code, named after a legendary wooden animal. (7)
- 14. A location on the internet where you can save your data (rather than on your computer or device). (5)
- 16. A type of malware which spreads through a network by replicating itself. (5)
- 19. Name for National Assets that are essentials to the functioning of society. (8, 8, 14)
- 22. A way to stop hackers getting into your accounts, even if they know your password. (3, 6, 14)
- 23. A type of malware which disables the victims access to data until payment is made, often in bitcoin. (10)
- 24. Threatening behaviour facilitated through electronic means such as texting. (5, 8)
- 25. Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of. (8,4)
- 26. When you should report a suspected cyber attack. (11)
- 27. A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking on a scam website. (8)
- 29. Phone number to report scam text messages to. (5, 5, 3, 3)
Down
- 1. A replacement to passwords. (8)
- 2. A type of malware which collects user activity without their knowledge. (7)
- 3. You need to create one of these to access services on the internet (such as email and shopping). (6, 7)
- 4. A way of confirming your identity to login to an account. Something you ###. (3)
- 5. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge). (6)
- 6. A copy of the information held on a device (such as photos and documents) which is stored somewhere else. (6)
- 7. Acronymn for the centre responsible for Helping to make the UK the safest place to live and work online. (4)
- 8. A way of confirming your identity to login to an account. Something you ####. (4)
- 10. Getting into someone else’s computer or device without their permission. (4)
- 15. Unwanted emails or messages that usually try to sell you something. (4)
- 17. Fradulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information. (8)
- 18. This type of malware gives hackers remote control of a victims device. (8)
- 20. This type of malware serves unwanted adverts. (6)
- 21. A useful tool to help you remember all your logins securely. (8, 7)
- 28. A way of confirming your identity to login to an account. Something you ####. (4)
