Across
- 4. Collective name that describes all forms of malicious software designed to wreak havoc on a computer.
- 6. A hardware or software-based defensive technology designed to protect your network by blocking outsiders from gaining unauthorized access.
- 7. Type of malicious program aimed to corrupt, erase or modify information on a computer before spreading to others.
- 10. A form of malware that deliberately holds your data hostage and demands a fee to be paid to regain access to the files on your computer.
- 13. An audio or video clip that has been edited and manipulated to seem real or believable.
- 14. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
Down
- 1. A type of unwanted malicious software that functions by spying on user activity without their knowledge and captures sensitive information.
- 2. Group of computers, printers and devices that are interconnected and governed as a whole.
- 3. Technology that allows us to access our files and/or services through the internet from anywhere in the world.
- 5. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 8. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 9. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- 11. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- 12. The technique used by hackers to obtain sensitive information using hand-crafted email messages designed to trick people.
