Across
- 3. Testing unit for humans to be identified
- 5. False website leading to identity theft.
- 9. Most popular social media
- 11. Destructive program diguised as a usefull application
Down
- 1. Illegal access into private cyber information
- 2. E-mails overcrowding from unknown sources
- 4. E-mail article intended to deceive
- 6. Physical apparatus in terms of computing
- 7. Programmes loaded onto a computer
- 8. Fake automated computers
- 10. Illegal unauthorized downloads eg. music
