GC-CYBERSECURITY

1234567891011
Across
  1. 2. A piece of malicious code that encrypts files so the user can not access them until they pay.
  2. 6. A piece of malicious code that is downloaded by pretending to be a useful piece of code
  3. 7. Malicious code can be transferred from one computer to another using physical devices such as a _ _ _ _ _ _ _ _
  4. 8. Old software and hardware may contain vulnerabilities that a hacker can e _ _ _ _ _ _ to gain access to a device.
  5. 9. A piece of malicious code used to damage computers or steal data
  6. 10. A hacker intercepts and steals data.
  7. 11. Emails sent that appear to come from a legitimate organisation but links within the mail may install malicious code.
Down
  1. 1. hackers attempt every posiible combination of characters to find a password
  2. 3. A piece of malicious code. It infects computers by being downloaded within files.
  3. 4. social ____________. Manipulating users into sharing their data.
  4. 5. A common way to infect a computer with malicious code is to _ _ _ _ _ _ it from the internet or by clicking on suspicious links in mail.