Cyber security

12345
Across
  1. 2. They travel around computer networks, looking for unprotected computers. Similar to a virus, it may corrupt or delete data.
  2. 3. pretending to be a genuine organisation to get someone's details.
  3. 5. a virus that usually come embedded within another file that looks genuine.
Down
  1. 1. horse malware that is disguised as a genuine file that gives hackers access to a computer.
  2. 4. engineering the art of tricking or manipulation to get someone to reveal their personal info.