Cyber Security

1234567891011
Across
  1. 2. The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
  2. 5. Gaining unauthorised access to or control of a computer system.
  3. 6. Generator Attack An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
  4. 7. Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password).
  5. 9. Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data.
  6. 11. An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
Down
  1. 1. Engineering A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
  2. 3. Computer Misuse Act Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
  3. 4. Hacking Performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
  4. 8. The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
  5. 10. This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.