Across
- 2. Gaining unauthorised access to or control of a computer system.
- 3. A self replicating malware that modifies code and programs.
- 5. A group or person who is interested in creating disruptions or embarrassment through hacking.
- 7. An attack where the perpetrator invents a story to convince the victim into providing money or data.
- 9. ________ is created when data is processed and meaningful.
- 10. Malware that infects a computer and spams the user with adds.
- 12. Automated programs that perform tasks repeatedly.
- 14. Multiple computers send packets or data to a system in an attempt to overload the network.
- 15. ____ is raw fact and figures.
Down
- 1. An attack where the victim receives and email disguised to resemble an official email.
- 4. An attack where the attacker is watching the victim while they provide sensitive information.
- 6. a form of virus that encrypts users data and requests payments to decrypt the data.
- 8. A large collection of malware infected devices called zombies.
- 11. A self replicating malware that spreads through the networks and uses system resources.
- 13. A piece of malware that disguises itself to appear as a useful program.
