Cyber Threats And security

123456789
Across
  1. 3. attacks used by cyber criminals for stealing confidential data
  2. 4. user's identity is stolen to commit crimes
  3. 6. used to enter their personal details
  4. 8. thef hackers steal and misuses someones personal information
  5. 9. spoofing technique used in spam attacks to trick users
Down
  1. 1. Stalking attackerharrases a victim through E-Mails, social media and chat rooms
  2. 2. illegal entry into computers
  3. 5. stealing the data by sniffing internet data traffic tools
  4. 7. Dos Attacks uses to spam the system with connection requests