Information Security

1234567891011
Across
  1. 4. it block the user to access his own data and give threats
  2. 5. it is a network security system designed to protect a trusted private netswork from unauthorised access
  3. 9. the main purpose of this to record the key pressed by user on the keyboard
  4. 10. this creates unnecessary junk in receiver's email
  5. 11. secretly listening to a conversation
Down
  1. 1. the short term used for malacious software
  2. 2. it is harassment and stalking through phones or the internet
  3. 3. when user access certain website small files downloaded on to the computer
  4. 6. it is the practice of sending fraudulent communication that appear to come from reputable source
  5. 7. It is a malware that do damaging activity on an infected computer
  6. 8. a piece of software code created to perform malacious activities