Cybersecurity

123456789
Across
  1. 3. Make sure you set a strong one by using upper, lowercase, numbers and characters
  2. 6. Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles
  3. 7. Common messaging platform for attackers to use for cyberattacks
  4. 8. An attempt to obtain sensitive information such as usernames, passwords etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
  5. 9. Type of cyberattack that uses malware disguised as a legitimate file to infect a system or device. Named by a famous wooden horse
Down
  1. 1. Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
  2. 2. Cyber-attackers use creative ways to trick you to enable them to steal it
  3. 4. Type of cyber-attack that uses multiple computers or devices to send overwhelming traffic to a targeted website or network. The attack aims to cause the target to slow down or completely stop functioning
  4. 5. Form of malware that poses a security program. If clicked, it pretends to scan for threats and malware on your PC and then lures you into paying real money in exchange for resolving the imaginary threat