Across
- 3. successfully attacks the Business, government,
- 4. internet
- 6. Web Pages Defacing
- 8. malicious software
- 11. sort of social engineering attack
- 13. passwaords
- 14. Flooding an Email box
Down
- 1. filters inbound and outbound network
- 2. combination of robot and network
- 5. Stealthily following a person, tracking chats
- 7. code of program
- 9. technique to secure data
- 10. information gathering
- 12. Taking control of computer with malware.
