Across
- 2. The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
- 4. Gaining unauthorised access to or control of a computer system.
- 5. An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
- 7. An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
- 9. Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
Down
- 1. A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
- 3. The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- 6. This is a form of attack that makes multiple attempts to discover something (such as a password).
- 8. This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.
