Cyber Security

123456789
Across
  1. 2. The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
  2. 4. Gaining unauthorised access to or control of a computer system.
  3. 5. An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
  4. 7. An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
  5. 9. Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
Down
  1. 1. A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
  2. 3. The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
  3. 6. This is a form of attack that makes multiple attempts to discover something (such as a password).
  4. 8. This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.