Cyber threats and security
Across
- 4. It is a criminal activity
- 5. It is an attacker harasses a victim through e-mails
Down
- 1. It is a ilelgal entry into a computer system
- 2. It is an act of imitating or making a false copy
- 3. It is is a process of monitoring and capturing