Across
- 1. Fake messages or emails pretending to be genuine to steal information.
- 4. Redirecting a user to a fake version of a legitimate website.
- 5. Persuading someone to give information by pretending to be someone trustworthy.
- 7. Messages designed to deceive users into clicking links or giving information.
- 8. Software that secretly gathers user information without permission.
- 10. An attack that floods a service or website with traffic so it cannot function.
- 11. A network of infected devices controlled remotely by an attacker.
- 13. Entering systems, networks or data without permission.
- 16. Attempting to gain unauthorised access to systems or data.
- 17. A malicious program that attaches to files and spreads between systems.
- 18. Tricking a user into clicking on something different from what they think they are clicking.
Down
- 2. Dishonest schemes to trick people into giving money or information.
- 3. Watching someone enter their PIN or password to steal it.
- 6. Stealing someone’s personal details and using them fraudulently.
- 7. Sites designed to imitate real ones in order to steal data.
- 9. Malicious software such as viruses, spyware, worms or trojans.
- 12. Self-replicating malware that spreads across networks without user action.
- 14. Software that forces unwanted advertising onto a device.
- 15. Manipulating people into giving away confidential information.
