Across
- 3. Malware that tricks you into downloading it by pretending to be something safe.
- 4. Software detecting cyber threats
- 5. The use of digital technology (such as social media, messaging apps, or emails) to intentionally harm, threaten, or upset someone.
- 7. Attack security vulnerabilities
- 9. Fake email for stealing data
- 10. Malware which spreads by itself across computers and networks
- 12. Malicious program holding data hostage
- 13. Short for malicious software, harmful software installed on a computer without permission.
- 14. Unauthorized access attempt
Down
- 1. Secret key for authentication
- 2. To trick people into illegally obtaining sensitive data.
- 6. When a hacker tries lots of different passwords very quickly.
- 8. Digital fingerprint identifier
- 11. Scrambles data for security
