DOT - Cyber Security

12345678910
Across
  1. 6. Gathers sensitive information that involves both social engineering and email
  2. 7. Malware that infects and spreads through files and links together with social engineering
  3. 9. Malware that locks data and encrypts it to allowing hackers commit fraud
  4. 10. Malware that works like a virus, but can infect devices on it's own and through software vulnerabilities
Down
  1. 1. A text file stored on your device used for logging into websites, storing preferences, and viewing history
  2. 2. An attack that aims to make a service, or website, unusable by 'flooding' it with malicious traffic
  3. 3. Malware that gathers information from a person, or business, by violating privacy
  4. 4. Malware that infects devices through suspicious files and links
  5. 5. A tool used to mask your online identity by redirecting and encrypting your data before it is sent
  6. 8. Malware that infects devices with multiple, intrusive, ads and slows overall performance