Cyber threats and security

12345
Across
  1. 4. It is a criminal activity
  2. 5. It is an attacker harasses a victim through e-mails
Down
  1. 1. It is a ilelgal entry into a computer system
  2. 2. It is an act of imitating or making a false copy
  3. 3. It is is a process of monitoring and capturing