Across
- 4. software that aims to harm computers and/or data
- 5. obtaining data, without permission, passing through a network
- 6. emails that pretend to be form legitimate companies but actually try to gain personal information
- 7. Activities that misuse computer systems/networks
Down
- 1. Obtaining confidential information by asking for it - usually making use of confidence tricks
- 2. Changing DNS records to point to the wrong IP address
- 3. trying all possible passwords until the correct one is found
- 5. flooding a server or network with pointless requests to make it fail or slow down
