Across
- 3. attacks used by cyber criminals for stealing confidential data
- 4. user's identity is stolen to commit crimes
- 6. used to enter their personal details
- 8. thef hackers steal and misuses someones personal information
- 9. spoofing technique used in spam attacks to trick users
Down
- 1. Stalking attackerharrases a victim through E-Mails, social media and chat rooms
- 2. illegal entry into computers
- 5. stealing the data by sniffing internet data traffic tools
- 7. Dos Attacks uses to spam the system with connection requests
