Cyber Security Threats

123456789101112131415161718
Across
  1. 1. Fake messages or emails pretending to be genuine to steal information.
  2. 4. Redirecting a user to a fake version of a legitimate website.
  3. 5. Persuading someone to give information by pretending to be someone trustworthy.
  4. 7. Messages designed to deceive users into clicking links or giving information.
  5. 8. Software that secretly gathers user information without permission.
  6. 10. An attack that floods a service or website with traffic so it cannot function.
  7. 11. A network of infected devices controlled remotely by an attacker.
  8. 13. Entering systems, networks or data without permission.
  9. 16. Attempting to gain unauthorised access to systems or data.
  10. 17. A malicious program that attaches to files and spreads between systems.
  11. 18. Tricking a user into clicking on something different from what they think they are clicking.
Down
  1. 2. Dishonest schemes to trick people into giving money or information.
  2. 3. Watching someone enter their PIN or password to steal it.
  3. 6. Stealing someone’s personal details and using them fraudulently.
  4. 7. Sites designed to imitate real ones in order to steal data.
  5. 9. Malicious software such as viruses, spyware, worms or trojans.
  6. 12. Self-replicating malware that spreads across networks without user action.
  7. 14. Software that forces unwanted advertising onto a device.
  8. 15. Manipulating people into giving away confidential information.