Across
- 4. An hacker sends a ___________ email requesting the victim for sensitive information
- 5. A _________ access by a third party is called a cyber attack
- 7. Trojan is an example of __________ attack
Down
- 1. Users need to use unique __________ passwords to strengthen defence against attacks
- 2. ________ are dummy computers systems to deceive attackers
- 3. A virtual wall between the computer and the internet is called as _______
- 6. A person who performs a cybersecurity attack is called a _______
