Cyber Security

12345678
Across
  1. 3. attack in which the victim receives an email disguised to look as if it has come from a reputable source
  2. 4. hackers who use tools downloaded from the internet
  3. 7. created when that data has been processed and becomes meaningful
  4. 8. set of methods used by cybercriminals to deceive individuals into handing over information
Down
  1. 1. involves the attacker watching the victim while they provide sensitive information
  2. 2. Gaining unauthorised access to or control of a computer system
  3. 5. raw facts and figures
  4. 6. an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money