Across
- 4. person who tries to gain unauthorised access to a computer
- 5. unauthorised access to a computer.
- 7. techniques that rely on measurable physical characteristics (eg fingerprint or iris) that can be automatically checked
- 9. software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them
- 10. program secretly installed on a computer to automatically collect information about the user over a period of time
- 11. that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details
Down
- 1. that causes pop-ups or windows that will not close
- 2. attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details
- 3. cyberattack that redirects a user from a genuine website to a fake one
- 6. that appears legitimate, but performs some malicious activity when it is run
- 8. computer program designed to replicate and damage other computer systems and software.
