Cyber security

1234567891011
Across
  1. 4. person who tries to gain unauthorised access to a computer
  2. 5. unauthorised access to a computer.
  3. 7. techniques that rely on measurable physical characteristics (eg fingerprint or iris) that can be automatically checked
  4. 9. software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them
  5. 10. program secretly installed on a computer to automatically collect information about the user over a period of time
  6. 11. that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details
Down
  1. 1. that causes pop-ups or windows that will not close
  2. 2. attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details
  3. 3. cyberattack that redirects a user from a genuine website to a fake one
  4. 6. that appears legitimate, but performs some malicious activity when it is run
  5. 8. computer program designed to replicate and damage other computer systems and software.