ICT - Revision (May)

1234567891011
Across
  1. 2. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
  2. 6. to checks incoming and outgoing network traffic.
  3. 8. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  4. 9. unwanted software that monitors and gathers information on a person and how they use their computer.
  5. 11. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
Down
  1. 1. an attack designed to steal a victim's password or other sensitive data.
  2. 3. a hostname that refers to the current computer used to access it.
  3. 4. software that is designed to gain access to your computer with malicious intent.
  4. 5. a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
  5. 7. ______________is the practice of protecting systems, networks, and programs from digital attacks
  6. 10. malicious form of self-replicating software.