soujanya hazra

12345678
Across
  1. 4. Designed to protect network
  2. 5. Illegal entry into a computer system or network.
  3. 6. the process of 'befriending' children on social media.
  4. 7. Hoaxing or misleading.
  5. 8. It is an act of harming or harassing using information technology in a deliberate manner
Down
  1. 1. Vital Information Resources Under Seize
  2. 2. Any criminal activity intended to harm anyone using the computer.
  3. 3. They do Cybercrime.