CyberSecurity: Ch. 7
Across
- 2. unsolicited email sent to large groups
- 4. one who accesses internet without permission
- 8. malicious software
- 9. acts involving a computing device on the internet
Down
- 1. blocks unauthorized access
- 3. connect to wifi without owner's permission
- 5. a small text file to store personal info
- 6. software that tracks your activity without your knowledge
- 7. a collection of zombie computers