Browsing Safely

12345
Across
  1. 2. It is an act of harming and harassing using information technology in a deliberate manner
  2. 4. It is used to conduct terrorism through the use of computers and internet in order to cause fear and panic
  3. 5. It refers to an illegal entry into a computer system or network
Down
  1. 1. It is a collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorised access
  2. 2. It is a process of befriending children on social media to facilitate online or physical sexual abuse
  3. 3. It is the short form of Vital Information Resources Under Seize