Information Security
Across
- 4. it block the user to access his own data and give threats
- 5. it is a network security system designed to protect a trusted private netswork from unauthorised access
- 9. the main purpose of this to record the key pressed by user on the keyboard
- 10. this creates unnecessary junk in receiver's email
- 11. secretly listening to a conversation
Down
- 1. the short term used for malacious software
- 2. it is harassment and stalking through phones or the internet
- 3. when user access certain website small files downloaded on to the computer
- 6. it is the practice of sending fraudulent communication that appear to come from reputable source
- 7. It is a malware that do damaging activity on an infected computer
- 8. a piece of software code created to perform malacious activities