Year 10 Summer 2025 Revision

1234567891011
Across
  1. 1. when attackers send scam emails (or text messages) that contain links to malicious websites
  2. 7. Going against the law of a country or jurisdiction
  3. 8. Tricking people into revealing confidential information, like passwords or PINs.
  4. 10. helps prevent bots from overwhelming websites by creating fake accounts or posting spam.
  5. 11. A biometric scan used in place of a password
Down
  1. 2. Copying a game from a website free that you should be paying for
  2. 3. After entering your password, you might need to enter a code sent to your phone
  3. 4. The practices and technologies used to protect systems, networks, programs, and data from cyber attacks and unauthorized access
  4. 5. a type of cyberattack where scammers use phone calls or voice messages to trick individuals into revealing sensitive information
  5. 6. The gaining of unauthorised access to data in a system or computer.
  6. 9. An intellectual property right that protects original creative works, granting the author exclusive control over how their work is used