CHAPTER 9

123456789
Across
  1. 3. Redirecting a website's traffic to a bogus(spoofed)website.
  2. 5. Exchange explicit messages and picture by telephone.
  3. 6. Sending an unsolicited message to many people at the same time.
  4. 7. A network of hijacked computer.
  5. 8. Software used to do harm.
Down
  1. 1. Unauthorized access, modification or use of an electronic device or some element of a computer system.
  2. 2. One types of malware that start with "R".
  3. 3. The clandestine use of a neighbour's Wi-Fi network.
  4. 4. Forms of spoofing.
  5. 9. Programme that can replicate itself and travel over networks.