Across
- 2. It is a collection of technologies, processes and practices designed to protect network.
- 3. It refers to the act of stealing and misusing someone's personal information.
- 6. It is a process of befriending children on social media.
- 8. It is the act of sending an email to a user; misleading him to believe that it is from a trusted person.
Down
- 1. It harm anyone using a computer and an internet connection.
- 4. It refers to an illegal entry into a computer system or network.
- 5. It is a program that disrupts the normal functioning of a computer.
- 7. It is a computer program that is designed to identity, prevent, and remove viruses from a computer.
