Cyber Security

12345678910111213
Across
  1. 1. A large collection of malware infected, or “zombie” computers or other devices.
  2. 4. Gaining unauthorised access to or control of a computer or website.
  3. 6. A form of malware that monitors a person and their device usage.
  4. 9. A piece of malware that is willingly downloaded by a user because it seems to perform a useful function, like a game, but actually has malicious purposes.
  5. 10. A self-replicating form of malware that spread through a network and slow it down by using up its bandwidth.
  6. 12. A form of spyware that monitors every keystroke made by a keyboard user.
  7. 13. Software that is designed to gain access to a computer or device for malicious purposes.
Down
  1. 1. When a scammer invents a scenario in a call or email in order to convince them to give them money or information.
  2. 2. ????? hat hacker: a hacker employed by a company or organisation to try and hack their security to check its strength.
  3. 3. When a scammer tries to trick a computer user into giving up valuable information or money by sending them an email designed to look sincere, usually with a link to click on.
  4. 5. A form of malware that infects a computer and forces it to download malicious pop-ups.
  5. 7. A form of malware that is a special type of virus that locks a computer, encrypts it’s files and demands money to decrypt them.
  6. 8. A self-replicating form of malware that is unwittingly downloaded by a user and then maliciously modifies programs on the computer.
  7. 11. ?????? engineering: a set of methods used by scammers to trick people into giving them valuable information or money.