Cybersecurity (year 09)

12345678910111213
Across
  1. 4. an attack involving an email designed to look official
  2. 6. people who are paid to legally hack into computer systems
  3. 8. malware that collects info about the user and sends it back to criminals
  4. 10. Manipulating people to get their personal information
  5. 11. attacker watches their victim to get sensitive information
  6. 13. malware that hides in legitimate software
Down
  1. 1. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
  2. 2. attack where the criminal tries to maintain a conversation with the victim
  3. 3. kind of access Computer Misuse Act protects from
  4. 5. Law that looks after your data
  5. 7. type of malware that encrypts your data until you pay
  6. 9. checks incoming and outgoing network traffic
  7. 12. attack done by flooding a website with lots of requests