IT Cyber Security Harrison's Epic Crossword!!!!!

12345678910
Across
  1. 4. Facts and statistics collected together for reference or analysis without context.
  2. 5. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  3. 6. a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder
  4. 7. when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website
  5. 9. the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
  6. 10. an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
Down
  1. 1. Facts provided or learned about someone/ something
  2. 2. the act of inventing a specific scenario to try and engage with the victim. The scenario will be set up so that it increases the chance that the victim will share their sensitive information or data.
  3. 3. information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
  4. 8. An action or decision which was not intended by a human.