Across
- 4. Designed to protect network
- 5. Illegal entry into a computer system or network.
- 6. the process of 'befriending' children on social media.
- 7. Hoaxing or misleading.
- 8. It is an act of harming or harassing using information technology in a deliberate manner
Down
- 1. Vital Information Resources Under Seize
- 2. Any criminal activity intended to harm anyone using the computer.
- 3. They do Cybercrime.
