Across
- 5. a type of malware that disguises itself as legitimate software,it finds personal data and takes over your computer system
- 8. the act of identifying and then exploiting weaknesses in a computer system or network
- 9. the action of sending text messages to fraudulently obtain another person’s bank details
- 10. a virus that replicates itself and destroys data and files on your computer
- 14. When a person is employed to work fewer hours than the normal working week
- 18. a computer program used to prevent, detect, and remove malware and viruses
- 19. a file or code that infects devices maliciously
- 20. a protective barrier between you and any other computers that you connect to
Down
- 1. Two or more employees doing the same job but working at different times
- 2. malware that displays ads on your computer
- 3. designed to give hackers access to and control over a target device
- 4. Makes phone calls pretending to be a legitimate company in order to steal personal information
- 6. a form of malware that locks people out of their files or device and demands money to restore access
- 7. When people change their jobs by learning the skills necessary for another job
- 11. The action of sending emails to fraudulently obtain another person’s bank details
- 12. doing a job at times that suit the worker and not necessarily during the traditional 9am to 5pm hours
- 13. a type of virus that tracks your internet activities to steal personal data
- 15. Pretends to be a legitimate website to steal passwords and personal data
- 16. When an employee works the full normal hours in a week but works fewer days
- 17. the use of messaging systems to send unsolicited to large numbers of people
