Across
- 2. Business to Business
- 6. online shopping
- 8. online harassment or abuse
- 9. Internet bank fruid
- 10. secure socket layer
Down
- 1. email fraud
- 3. Business to Customer
- 4. Customer to Customer
- 5. Black-hat hackers in an other name
- 7. programs that aim to harm your computer
