security puzzle

12345678910
Across
  1. 4. A course of action, guiding principle, or procedure considered expedient, prudent, or advantageous.
  2. 7. A computer overtaken by a hacker and used to perform malicious tasks.
  3. 8. is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
  4. 10. A security tool that protects an individual computer or even an entire network from unauthorized attempts to access your system.
Down
  1. 1. A form of spyware that enters your computer from an Internet download.
  2. 2. A new term for spam messages being sent to instant message addresses.
  3. 3. Forging an e-mail or instant message address to make it appear as if it came from someone or somewhere other than the true source.
  4. 5. The transfer of data from one computer (or server) to another computer.
  5. 6. A person who enjoys exploring the details of computers and how to stretch their capabilities.
  6. 9. A violation or infraction, as of a law, a legal obligation, or a promise.