Across
- 2. The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
- 5. Gaining unauthorised access to or control of a computer system.
- 6. Generator Attack An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
- 7. Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password).
- 9. Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data.
- 11. An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
Down
- 1. Engineering A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
- 3. Computer Misuse Act Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
- 4. Hacking Performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
- 8. The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- 10. This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.
