computing

123
Across
  1. 2. What is the name people give to fraudulent emails?
Down
  1. 1. What is the name of the secret technique used to send messages in 100BC?
  2. 3. what is the process of gaining information and taking over someone's possession