cyber threats and security

123
Across
  1. 3. STEALINGINFORMATION WITHOUT USER PERMISSION
Down
  1. 1. THESE ATTACK CAUSE DATA TO DAMAGE
  2. 2. IN PHISHINGTHE RECIEVER IS TRICKED BY MAKING HIM/HER VBELIEVE THAT THE MESSAGE IS RECIEVED FROM A TRUSTED SOURCE