CyberSecurity: Ch. 7

123456789
Across
  1. 2. unsolicited email sent to large groups
  2. 4. one who accesses internet without permission
  3. 8. malicious software
  4. 9. acts involving a computing device on the internet
Down
  1. 1. blocks unauthorized access
  2. 3. connect to wifi without owner's permission
  3. 5. a small text file to store personal info
  4. 6. software that tracks your activity without your knowledge
  5. 7. a collection of zombie computers