Across
- 4. scams sent via emails
- 5. information that has been processed
- 8. collection of internet-connected devices
- 10. facts provided or learned about something or someone
- 11. individuals that break into the computing code
- 12. any program or file that is intentionally harmful to a computer
Down
- 1. infect the computer systems of users and manipulates the infected system
- 2. when someone makes up a story to gain a persons interest and uses this to encourage them to give away personal information
- 3. an application that controls access to networks/monitors
- 6. self-replicating malware
- 7. a person that looks over someone's shoulder as they enter personal data
- 9. attaches itself to another programme, which can replicate itself
