Across
- 2. hat look for holes in other systems and then contact the companies for payment in return for fixing the problem.
- 4. Illegally hacking to steal data or with some other criminal intent.
- 6. Irritating software that causes pop-up advertisiements to appear in a browser
- 7. Computer is tricked and taken to a fake site it thought was genuine.
- 9. Aimed at company or web servers to overload them or force them to crash.
- 14. This should be updated consistently for antivirus software to be efficient.
- 15. Unauthorised access to the network.
- 16. Small file placed on hard-disk and stored by websites to store personal preferneces.
- 17. self-replicating code that attaches itself to programs.
Down
- 1. keylogging software that covertly gathers and reports your online activities.
- 3. An email used a bait to trick users into sharing their personal details.
- 5. Ethical hackers, employed by companies to deliberately find holes in their own security.
- 8. Asked for a fee in order for the ‘lock’ to be removed and regain access to your files
- 10. Non-self-replicating virus that masquerades as an innocent file.
- 11. Illegally accessing program source code to change it.
- 12. provides the creator with unauthorised remote access to an infected computer
- 13. Will compromise a computer and use the host’s storage and processing power to perform jobs.
