HT3: Cyber Security
7 | |||||||||||||
4 | 6 | ||||||||||||
3 | |||||||||||||
1 | 9 | ||||||||||||
8 | |||||||||||||
5 | |||||||||||||
2 |
Down | Across | ||||
---|---|---|---|---|---|
# | Clue Down | ✓ | # | Clue Across | ✓ |
3 | malicious software that is designed to gain access to your computer with malicious intent (7) | 1 | a form of malware which displays adverts on a user's computer (6) | ||
6 | a form of malware which shares user data without their permission (7) | 2 | deliberately harmful (9) | ||
7 | a form of malware that tricks you into installing it so that it can give someone else remote control over your computer (6/5) | 4 | a form of malware which encrypts user data and demands payment before they can access it again (10) | ||
8 | A form of malware which, when run by a user, infect other programs to self-replicate and cause damage (5) | 5 | the ability of some malware to copy itself and spread to infect other computers or programs (4/9) | ||
9 | A form of malware which is able to self replicate without needing to be run by the user (4) |