Cyber Threats & Security
Across
- 3. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- 5. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- 6. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- 1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- 2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- 4. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM