Exercise

1234567
Across
  1. 4. eavesdropping program that monitors information travelling over network
  2. 5. extortion of money from user by taking control of their computers
  3. 6. malicious software
  4. 7. Thousands of "zombie" infected PC with malicious software
Down
  1. 1. setting up fake websites to ask users for private information
  2. 2. an example of worms
  3. 3. a method to prevent unauthorized users from accessing private network
  4. 4. policies and procedures to prevent unauthorized access