1. 4. information
  2. 5. software that is secretly installed into a system
  3. 9. capability to limit network traffic between networks
  4. 11. measures to reduce the likelihood of an unwanted occurence
  5. 12. software that tracks keystrokes and keyboard events
  1. 1. the abuse of email to send unsolicited bulk messages
  2. 2. a person who breaks into a computer or network
  3. 3. a program that can infect a computer and spread to another computer
  4. 6. a string of characters used to verify access authorization
  5. 7. the process of transforming plaintext into cipher text
  6. 8. software that compromises the operation of a system
  7. 10. self replicating program that uses networking mechanisms to spread itself