Across
- 2. Intercepts traffic as it is sent over the network to collect names, passwords and other information.
- 6. What using when we prove we be a real sender.
- 7. which application use for see the different trams who circulate with the PC.
Down
- 1. Sending an email seems reliable to obtain sensitive information on the target.
- 3. What is a name of the cyber criminal.
- 4. Transmits malicious scripts using clickable content sent to the target's browser.
- 5. Held hostage until she agrees to pay the attacker a ransom.