Across
- 1. A type of malware that records every single press of the keyboard that you make
- 3. A key only used by one individual to decrypt
- 4. A key that can be used by anyone to encrypt messages
- 6. Gaining unauthorised access to or control of a computer system
- 9. A trap for cybersecurity criminals
- 10. Bullying that takes place online
- 13. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- 16. Special viruses that move from computer to computer without human action
- 17. Impersonation of email address or device to gain unauthorized access to information or systems
- 18. Copy of data
- 19. Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- 24. A weaknesses in computers
- 26. scrambled data
- 27. Ethical hacking in order to find any cybersecurity weaknesses
- 28. Raw data that is put into context and has meaning
Down
- 1. core of an operating system
- 2. General term for programs that gains access to your system for unethical reasons
- 4. Email that contains a message with a suspicious link designed to steal personal information
- 5. annoying malware that spams you with ads
- 7. Software that protects computers from virus related harm
- 8. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- 11. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- 12. Malicious code typically disguised as a legitimate program
- 14. To take advantage of a system's weakness
- 15. I am not a robot
- 18. Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- 20. Secretly watches computer activity
- 21. Collection of malware infested computers that form a network to attack
- 22. Electronic messages sent through the internet
- 23. Readable data
- 24. Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- 25. An internal security team that defends against both real attackers and Red Teams