CHAPTER 9
Across
- 3. Redirecting a website's traffic to a bogus(spoofed)website.
- 5. Exchange explicit messages and picture by telephone.
- 6. Sending an unsolicited message to many people at the same time.
- 7. A network of hijacked computer.
- 8. Software used to do harm.
Down
- 1. Unauthorized access, modification or use of an electronic device or some element of a computer system.
- 2. One types of malware that start with "R".
- 3. The clandestine use of a neighbour's Wi-Fi network.
- 4. Forms of spoofing.
- 9. Programme that can replicate itself and travel over networks.