Across
- 4. eavesdropping program that monitors information travelling over network
- 5. extortion of money from user by taking control of their computers
- 6. malicious software
- 7. Thousands of "zombie" infected PC with malicious software
Down
- 1. setting up fake websites to ask users for private information
- 2. an example of worms
- 3. a method to prevent unauthorized users from accessing private network
- 4. policies and procedures to prevent unauthorized access
