Across
- 3. Duplicating a file, program, or media
- 4. Cheating by using another person's ideas
- 6. Computer-related crime
- 7. Also known as Malicious Software
- 8. Bullying using electronic media
Down
- 1. Technique invaders use to make their network or Internet transmission appear to be legitimate to their victims
- 2. The science of working in the proper position
- 4. Exclusive right granted for an invention
- 5. A hardware or software that helps protect the network's resources from intrusion
- 9. Group of infected computers and mobile devices that are all connected to the same network