Cybersecurity Week Crossword

12345678910111213141516
Across
  1. 2. A person who uses computers to gain unauthorized access to data
  2. 3. Sofware that automatically displays advertisements
  3. 6. A small file from a website that tracks your actions
  4. 8. Publishing someone's personal information online without their consent
  5. 9. Practice of granting required access to authorized persons based on job requirements
  6. 10. Occurs when an unauthorised person bypasses access control measures for a restricted area by being granted access through an authorised user, who subjects themselves to the access control measures
  7. 11. Bulk or unwanted emails
  8. 12. A combination of username, password or biometrics to authenticate access a system
  9. 13. Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
  10. 14. A technique used to disguise the sender's identity to gain sensitive information
  11. 15. A person that has the potential to or causes actual damage to an organisation through using their authorized access to systems
  12. 16. Method of exploiting social interactions that trick users to reveal sensitive information to gain access to a system
Down
  1. 1. Software to disrupt, damage or gain unauthorised access to a computer system
  2. 4. A website used to attract hackers, without risking corporate data
  3. 5. Area of study where machines are programmed to reason, learn and act similar to human intelligence
  4. 7. Malicious software that prevents access to a system until a ransom is paid
  5. 10. A form of social engineering that is done via email or other messages