Scsu

12345678910
Across
  1. 3. refers to act of hiding the ip address to miss lead the target
  2. 7. refers to the act of monitoring user commanicetion without consent
  3. 9. insuring the infomation staya in it origanal from and present modified over a network
  4. 10. attack is techingave used by attackers
Down
  1. 1. insuring that your system stays available to pletform its metendet funetion when required
  2. 2. securing your information only authoritht person will be access
  3. 4. unsolicited bulk mails
  4. 5. zombies computer
  5. 6. a small software design to hide files
  6. 8. a protection of your cyber or digital assets or information system from attackrs