Beginners Level

12345
Across
  1. 2. using _____________ for doing competitive information gathering is a crime.
  2. 4. it is necessary to methodically & systematically ensure all pieces of information related to the target.
Down
  1. 1. _______________ needs to be turned off in order to prevent from this attack.
  2. 3. using spyware is an example of _________ type of information gathering.
  3. 5. the _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.