Scsu
Across
- 3. refers to act of hiding the ip address to miss lead the target
- 7. refers to the act of monitoring user commanicetion without consent
- 9. insuring the infomation staya in it origanal from and present modified over a network
- 10. attack is techingave used by attackers
Down
- 1. insuring that your system stays available to pletform its metendet funetion when required
- 2. securing your information only authoritht person will be access
- 4. unsolicited bulk mails
- 5. zombies computer
- 6. a small software design to hide files
- 8. a protection of your cyber or digital assets or information system from attackrs