Across
- 2. It is an act of harming and harassing using information technology in a deliberate manner
- 4. It is used to conduct terrorism through the use of computers and internet in order to cause fear and panic
- 5. It refers to an illegal entry into a computer system or network
Down
- 1. It is a collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorised access
- 2. It is a process of befriending children on social media to facilitate online or physical sexual abuse
- 3. It is the short form of Vital Information Resources Under Seize
