Cybersecurity Week 2025

123456789101112131415
Across
  1. 2. Publishing someone's personal information online without their consent
  2. 3. Users are tricked into revealing sensitive information to gain access to a system
  3. 6. A form a social engineering that is done via email or other messages
  4. 9. Area of study where machines are programmed to reason, learn and act similar to human intelligence
  5. 10. Software that causes damage to data and software
  6. 12. A network device used to separate an internal network from an external network, usually the Internet
  7. 13. Software to disrupt, damage or gain unauthorised access to a computer system
  8. 15. Any or a combination of usernames, passwords or biometrics to access a system
Down
  1. 1. Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
  2. 4. A technique used to disguise the sender's identity to gain sensitive information
  3. 5. A method of writing that disguises a message
  4. 7. Type of threat that has the potential to or cause actual damage that can be done to an organisation by a person with authorized access to systems
  5. 8. Malicious software that prevents access to a system until a ransom is paid
  6. 11. Sofware that automatically subjects a user to advertisements
  7. 14. A person who uses computers to gain unauthorized access to data