Across
- 2. What blagging is used for.
- 6. What a cybercriminal commits.
- 8. Pretending to be trustworthy to deceive someone is this type of engineering.
- 9. Data that has been processed.
- 10. The term for sending fake emails asking for personal information.
- 11. Raw facts and figures.
Down
- 1. Secretly watching someone enter a PIN or password.
- 3. A person who uses the internet to commit a crime.
- 4. Gaining unauthorised access to computers.
- 5. Can identify you on its own or with other details.
- 7. Another name for Two Factor Authentication.
- 12. A law that protects your personal information.
