Unit 11: Cyber Security LA.A

12345678
Across
  1. 3. The taking of data without permission
  2. 6. The process of deceiving people into sharing information with an unknown third party.
  3. 7. is software that denies access to files or the computer as a whole until a ransom is paid.
Down
  1. 1. Force Attack Hackers try numerous keywords and password combinations in order to gain unauthorised access to a system or file.
  2. 2. Software rollouts designed to fix issues or bugs
  3. 4. malicious programs that pretend to be legitimate, but actually carry out hidden/harmful actions.
  4. 5. is unsolicited bulk email, the electronic equivalent of junk mail, that comes to your inbox.
  5. 8. A virus that replicates itself, also a popular season 2 Fortnite emote!