Across
- 5. you should do auto- _ _ _ _ _ _ _ to your operating system and applications to keep them up to date.
- 6. plain text is turned into cipher text so that if it is intercepted it cannot be understood. you must have the key to be able to decrypt the code.
- 9. disguises itself as legitimate software. allows the creator to get 'backdoor' access to remotely see files.
- 10. multiple computers flood a network with data requests so that it is unusable.
- 11. malicious software. designed to cause harm to a computer.
- 12. a combination of letters, symbols and number which allows you to access an account.
- 15. self replicating malware. often downloaded from email attachments. will delete and modify files.
- 16. emails that do not contain a hyperlink. the sender will create a fake story and convince you to send them money/ details.
- 17. monitors incoming and outgoing data. blocks access to unsafe websites.
Down
- 1. malicious software which makes pop-ups appear on your computer.
- 2. software which locks and encrypts all of your files. you will then be told to pay a certain amount of money to get your files back.
- 3. software which spies on your actions. keylogging can be used to monitor your keystrokes and access your passwords.
- 4. processed facts and figures. they have meaning.
- 7. looking over someone to find out their passwords.
- 8. a system designed to tell a human apart from a bot. you typically have to select images of the same item e.g. traffic lights.
- 12. fake emails pretending to be real. often from a bank asking you to click on a hyperlink and enter details.
- 13. infects an entire network of computers and takes up bandwidth which makes the network run very slowly.
- 14. raw facts and figures. unprocessed.
