Cyber Threats & Security

123456
Across
  1. 3. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. 5. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. 6. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. 1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. 2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. 4. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM