Across
- 3. attack in which the victim receives an email disguised to look as if it has come from a reputable source
- 4. hackers who use tools downloaded from the internet
- 7. created when that data has been processed and becomes meaningful
- 8. set of methods used by cybercriminals to deceive individuals into handing over information
Down
- 1. involves the attacker watching the victim while they provide sensitive information
- 2. Gaining unauthorised access to or control of a computer system
- 5. raw facts and figures
- 6. an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money
