Across
- 3. Used by computers to solve problems
- 4. Type of malware attack
- 8. Home for servers
- 9. Method to covert data into more secure form
- 11. Collection of data
- 13. Part of Cloud computing
- 14. Known for all unauthorized activities
- 15. An ecosystem to solve real life problem
- 16. A fraud practice to send email
- 18. Mostly a part of mail
Down
- 1. Occurrence of unusual event
- 2. A way of reducing manual tasks
- 3. A way of working in Corporate world
- 5. Activity which is frequent done by our Team
- 6. Part of network Security
- 7. Block chain technology
- 10. Methodology to improve work
- 12. Legacy of fresco family
- 17. Counter attack to unauthorized use of system
