Cyber Security

1234567891011121314151617
Across
  1. 5. you should do auto- _ _ _ _ _ _ _ to your operating system and applications to keep them up to date.
  2. 6. plain text is turned into cipher text so that if it is intercepted it cannot be understood. you must have the key to be able to decrypt the code.
  3. 9. disguises itself as legitimate software. allows the creator to get 'backdoor' access to remotely see files.
  4. 10. multiple computers flood a network with data requests so that it is unusable.
  5. 11. malicious software. designed to cause harm to a computer.
  6. 12. a combination of letters, symbols and number which allows you to access an account.
  7. 15. self replicating malware. often downloaded from email attachments. will delete and modify files.
  8. 16. emails that do not contain a hyperlink. the sender will create a fake story and convince you to send them money/ details.
  9. 17. monitors incoming and outgoing data. blocks access to unsafe websites.
Down
  1. 1. malicious software which makes pop-ups appear on your computer.
  2. 2. software which locks and encrypts all of your files. you will then be told to pay a certain amount of money to get your files back.
  3. 3. software which spies on your actions. keylogging can be used to monitor your keystrokes and access your passwords.
  4. 4. processed facts and figures. they have meaning.
  5. 7. looking over someone to find out their passwords.
  6. 8. a system designed to tell a human apart from a bot. you typically have to select images of the same item e.g. traffic lights.
  7. 12. fake emails pretending to be real. often from a bank asking you to click on a hyperlink and enter details.
  8. 13. infects an entire network of computers and takes up bandwidth which makes the network run very slowly.
  9. 14. raw facts and figures. unprocessed.