Across
- 3. The taking of data without permission
- 6. The process of deceiving people into sharing information with an unknown third party.
- 7. is software that denies access to files or the computer as a whole until a ransom is paid.
Down
- 1. Force Attack Hackers try numerous keywords and password combinations in order to gain unauthorised access to a system or file.
- 2. Software rollouts designed to fix issues or bugs
- 4. malicious programs that pretend to be legitimate, but actually carry out hidden/harmful actions.
- 5. is unsolicited bulk email, the electronic equivalent of junk mail, that comes to your inbox.
- 8. A virus that replicates itself, also a popular season 2 Fortnite emote!
