Across
- 4. the activity of tricking people into providing personal or financial information by sending emails, texts, etc. that seem to be from companies that the person knows, often in order to steal money from them
- 6. a computer program that is a type of virus and that spreads across a network by copying itself
- 10. a series of letters, numbers, etc. that you must type into a computer or computer system in order to be able to use it
- 11. software that is used to demand money from an individual or organization
- 12. a document that you send to somebody using email
- 13. a number of computers and other devices that are connected together so that equipment and information can be shared
Down
- 1. a weakness in software programs that can be exploited by hackers to compromise computers.
- 2. a mistake in something that means that it is not correct or does not work correctly
- 3. a set of programs that controls the way a computer works and runs other programs
- 5. attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.
- 7. a small memory device that can be used to store data from a computer or digital camera and to move it from one device to another
- 8. any security incident in which unauthorized parties access sensitive or confidential information
- 9. a collection of software tools or a program that gives a hacker remote access to, and control over, a computer or network.
