Across
- 2. deliberate attempt to compromise security using malicious activity
- 3. Naming system followed to identify computers connected to Internet
- 6. criminal activity performed using computer or a network
- 8. ready to access for authorized people
- 9. state of maintaining secrecy of communication
- 12. malicious software that prevents the users from
- 13. use of Computers and Networks to gain illegal access for confidential information for some gain
Down
- 1. way of confirmation of individual's identity
- 4. unskilled individual who uses programs written by others to initiate attacks
- 5. Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
- 7. their own data for want of money
- 10. computer program designed to protect computer
- 11. illegal piece of software designed to cause harm to computers/networks
