Across
- 2. Gaining access to data or systems, often illegally.
- 6. This is the part of the web that can be searched by a search engine, such as Google.
- 7. A very basic type of encryption used by the Romans where the alphabet is rotated.
- 10. Using stolen data to pretend to be someone else, often for financial gain.
- 15. A method of security where a code is emailed or sent to a mobile device.
- 17. This is a part of the web that is not monitored. People often use the dark web for illegal activities, including drugs and hacking.
- 18. A basic way of protecting data.
- 19. Whose responsibility is it to keep your data secure?
- 20. A way of scrambling data using a key so it can't be understood without the key.
Down
- 1. A type of hacker who hacks legally, often to test systems.
- 3. Using the Internet to send horrible messages or to threaten people.
- 4. This is part of the web that is hidden behind passwords, such as bank accounts.
- 5. Software used to restrict access to a computer network.
- 8. A type of hacker who hacks illegally, often for financial gain.
- 9. Tricking a user into giving out personal information, such as bank details or passwords. Often done through email.
- 11. Type of software used to hack or gain access to people's data.
- 12. Type of email that is unwanted or not asked for. Often used in scams.
- 13. A piece of software used to detect and remove viruses.
- 14. Using sophisticated methods to convince people to trust you in order to gain access to their data or systems illegally.
- 16. A type of data attack where data is encrypted and the owner is asked to pay a fee before the data is released.
