Cyber Security Revision

1234567891011121314151617181920
Across
  1. 2. Gaining access to data or systems, often illegally.
  2. 6. This is the part of the web that can be searched by a search engine, such as Google.
  3. 7. A very basic type of encryption used by the Romans where the alphabet is rotated.
  4. 10. Using stolen data to pretend to be someone else, often for financial gain.
  5. 15. A method of security where a code is emailed or sent to a mobile device.
  6. 17. This is a part of the web that is not monitored. People often use the dark web for illegal activities, including drugs and hacking.
  7. 18. A basic way of protecting data.
  8. 19. Whose responsibility is it to keep your data secure?
  9. 20. A way of scrambling data using a key so it can't be understood without the key.
Down
  1. 1. A type of hacker who hacks legally, often to test systems.
  2. 3. Using the Internet to send horrible messages or to threaten people.
  3. 4. This is part of the web that is hidden behind passwords, such as bank accounts.
  4. 5. Software used to restrict access to a computer network.
  5. 8. A type of hacker who hacks illegally, often for financial gain.
  6. 9. Tricking a user into giving out personal information, such as bank details or passwords. Often done through email.
  7. 11. Type of software used to hack or gain access to people's data.
  8. 12. Type of email that is unwanted or not asked for. Often used in scams.
  9. 13. A piece of software used to detect and remove viruses.
  10. 14. Using sophisticated methods to convince people to trust you in order to gain access to their data or systems illegally.
  11. 16. A type of data attack where data is encrypted and the owner is asked to pay a fee before the data is released.